Advertisement

Cloud Security: A Virtualized VLAN (V2LAN) Implementation

  • Farid ShiraziEmail author
  • Alexander Krasnov
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9731)

Abstract

Cloud computing is an emergent technology that brings together all aspects of IT infrastructure from software installation and upgrade to platform oriented services to network and to hardware and storage. However, there are various security concerns that prevent customers from taking benefits of the cloud. Many studies have offered a wide range of possible solutions to deal with cloud security issues. Some of these solutions are very expensive therefore not suitable for Cloud. For example, data encryption is considered as a vital tool and mechanism for securing business data. However, it is not feasible to deploy data encryption on every piece of data. Anthes argues that encryption is sometimes seen as the ultimate security measure, but in fact, encryption is a complex and costly process since encrypted data needs to be downloaded and decrypted for local use and then possibly uploading the results [1]. This study offers a robust, fast and cost effective security measures for protecting Cloud data residing on virtual machines (VMs) without the need for any additional monitoring package or introspection at VM level.

Keywords

Cloud computing V2LAN Virtualization Identification Authorization Multi-tenancy 

References

  1. 1.
    Anthes, G.: Security in the cloud. Commun. ACM 53(11), 16–18 (2010)CrossRefGoogle Scholar
  2. 2.
    Truong, D.: How cloud computing enhances competitive advantages: a research model for small business. Bus. Rev. 15(1), 59–65 (2010)Google Scholar
  3. 3.
    Carlo, J.L.: Internet computing as a disruptive information technology innovation: the role of strong order effects. Inf. Syst. J. 21, 91–122 (2011)CrossRefGoogle Scholar
  4. 4.
    Dewar, R., Dutton, E.J.: The adoption of radical and incremental innovations: an empirical analysis. Manag. Sci. 32, 1422–1433 (1986)CrossRefGoogle Scholar
  5. 5.
    Teece, D.P.: Dynamic capabilities and strategic management. Strateg. Manag. J. 18, 509–533 (1997)CrossRefGoogle Scholar
  6. 6.
    Hemerly, J.: Public policy considerations for data-driven innovation. IEEE Comput. Soc. 46(6), 25–31 (2013)CrossRefGoogle Scholar
  7. 7.
    Chisholm, T., Smigala, H.: IBM Advances Cloud Computing in Education; Unveils IBM Cloud Academy (2009). http://www-03.ibm.com/press/us/en/pressrelease/28749.wss
  8. 8.
    Katzan, H.: On the privacy of cloud computing. Int. J. Manag. Inf. Syst. 14(2), 1–12 (2010)Google Scholar
  9. 9.
    Kulkarni, G., Gambhir, J., Patil, T., Dongare, A.: A security aspects in cloud computing. In: 2012 IEEE 3rd International Conference on Software Engineering and Service Science (ICSESS), pp. 547–550 (2012)Google Scholar
  10. 10.
    Takabi, H., Joshi, J.B., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)CrossRefGoogle Scholar
  11. 11.
    Jordan, J.: Climbing out of the box and into the cloud: building webscale for libraries. J. Libr. Adm. 51(1), 3–17 (2011)Google Scholar
  12. 12.
    Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Edition on Risks and Compliance (Theory in Practice), O’Reilly Media, ISBN: 978-0596802769 (2009)Google Scholar
  13. 13.
    Rekhter: Address allocation for private internets (1996). Retrieved from Network Working Group. http://tools.ietf.org/html/rfc1918
  14. 14.
    Amazon AWS. AWS Signature Version 1 is Insecure (2008). http://www.daemonology.net/blog/2008-12-18-AWS-signature-version-1-is-insecure.html
  15. 15.
    The register. Hackers Break SSL Encryption Used by Millions of Sites (2011). http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl
  16. 16.
    Atkins, D.: Threat Analysis of the Domain Name System (DNS) (2004). Retrieved from Network Working Group. http://tools.ietf.org/html/rfc3833
  17. 17.
    Evans, K.: IP Spoofing Attack and Defenses (2010). http://resources.infosecinstitute.com/ipspoofing-attack
  18. 18.
    Contextis. Assessing Cloud Node Security whitepapers@ (2011). Retrieved from Context Information Security: contextis.com
  19. 19.
    OWASP. The Ten Most Critical Web Application Security Risks (2010). Retrieved from Open Web Application Security Project. https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
  20. 20.
    Sudha, S., Viswanathan, V.M.: Addressing security and privacy issues in cloud computing. J. Theor. Appl. Inf. Technol. 48(2), 708–719 (2013)Google Scholar
  21. 21.
    Fewer, S.: ARP Poisoning an Investigation into Spoofing the Address Resolution Protocol (2009). http://www.harmonysecurity.com
  22. 22.
    Garfinkel,T., Rosenblum, M.: When virtual is harder than real: security challenges in virtual machine based computing environments. In: Proceedings of the 10th Workshop on Hot Topics in Operating Systems (2005). USENIX Association. https://www.usenix.org/legacy/events/hotos05/final_papers/garfinkel.html
  23. 23.
    Ristenpart, T. Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 09), pp. 199–212. ACM Press (2009)Google Scholar
  24. 24.
    Oberheide, C. J.: Empirical exploitation of live virtual machine migration. In: Proceedings of Black Hat DC 2008 Convention (2008). www.net-security.org/dl/articles/migration.pdf
  25. 25.
    Tsai, H., Siebenhaar, M., Miede, A., Huang, Y., Steinmetz, R.: Threat as a service?: virtualization’s impact on cloud security. IEEE Comput. Soc. 14(1), 32–37 (2012)Google Scholar
  26. 26.
    Yan, J., Early, S., Anderson, R.: The XenoService – A Distributed Defeat for Distributed Denial of Service. Proceedings of Information Survivability Workshop, Boston, Massachusetts, USA (2000)Google Scholar
  27. 27.
    Moss, H., Zierick, J.: Cloud providers will be better at security than you can ever be. Netw. World 28(4), 27–28 (2011)Google Scholar
  28. 28.
    Almutairi, A., Sarfraz, M.I., Basalamah, S., Walid, G., Aref, W.G., Ghafoor, A.: A distributed access control architecture for cloud computing. IEEE Softw. 29(2), 36–44 (2012)CrossRefGoogle Scholar
  29. 29.
    Behl, A., Behl, K.: An analysis of cloud computing security issues. In: 2012 World Congress on Information and Communication Technologies (WICT), pp. 109–114 (2012)Google Scholar
  30. 30.
    Cachin, C., Schunter, M.: A cloud you can trust - IEEE Spectrum, December issue, pp. 28–33 (2011)Google Scholar
  31. 31.
    Cisco. Technical Overview of Virtual Device Contexts, Cisco Systems Inc. (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Ryerson UniversityTorontoCanada

Personalised recommendations