A Security Framework for Virtual Resource Management in Horizontal IaaS Federation

Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 28)


The horizontal IaaS federation is an emerging concept where the virtual resources are delivered to the users from the federated entities. There are a few challenges to manage the virtual resources securely in federated environment as follows. First, the virtual resources are spread over the federating entities. Second, the federation is a special case of distributed system where the resources are collectively owned by the federating participants. This paper proposes a security framework for the management of federated virtual resources by splitting all the security related modules into two parts: local and global sub-modules.


IaaS Federation Security Framework Cloud Computing 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Nimkar, A.V., Ghosh, S.K.: Towards full network virtualization in horizontal iaas federation: Security issues. Journal of Cloud Computing: Advances, Systems and Applications, SpringerOpen 2(19), 19:1–19:13 (2013)Google Scholar
  2. 2.
    Khatua, S., Mukherjee, N., Chaki, N.: A new agent based security framework for collaborative cloud environment. In: 2011 Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW 2011, pp. 76:1–76:1. ACM, New York (2011)Google Scholar
  3. 3.
    Manno, G., Smari, W., Spalazzi, L.: Fcfa: A semantic-based federated cloud framework architecture. In: 2012 International Conference on High Performance Computing and Simulation (HPCS), pp. 42–52 (2012)Google Scholar
  4. 4.
    Loutas, N., Peristeras, V., Bouras, T., Kamateri, E., Zeginis, D., Tarabanis, K.: Towards a reference architecture for semantically interoperable clouds. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pp. 143–150 (2010)Google Scholar
  5. 5.
    Famaey, J., Latre, S., Strassner, J., De Turck, F.: A hierarchical context dissemination framework for managing federated clouds. Journal of Communications and Networks 13(6), 567–582 (2011)CrossRefGoogle Scholar
  6. 6.
    Rochwerger, B., Breitgand, D., Levy, E., Galis, A., Nagin, K., Llorente, I., Montero, R., Wolfsthal, Y., Elmroth, E., Caceres, J., Ben-Yehuda, M., Emmerich, W., Galan, F.: The reservoir model and architecture for open federated cloud computing. IBM Journal of Research and Development 53(4), 4:1–4:11 (2009)Google Scholar
  7. 7.
    Singhal, M., Chandrasekhar, S., Ge, T., Sandhu, R., Krishnan, R., Ahn, G.J., Bertino, E.: Collaboration in multicloud computing environments: Framework and security issues. Computer 46(2), 76–84 (2013)CrossRefGoogle Scholar
  8. 8.
    Loopez, G., Canovas, O., Goodell, G., Mez-Skarmeta, A., Girao, J.: A swift take on identity management. Computer 42(5), 58–65 (2009)CrossRefGoogle Scholar
  9. 9.
    Chowdhury, N., Zaheer, F.E., Boutaba, R.: imark: An identity management framework for network virtualization environment. In: 2009 IFIP/IEEE International Symposium on Integrated Network Management, pp. 335–342 (2009)Google Scholar
  10. 10.
    Ferraiolo, D., Kuhn, D.: Role-based access control. In: 1992 5th National Conference on Computer Security, pp. 554–563 (1992)Google Scholar
  11. 11.
    Shen, H., Hong, F.: An attribute-based access control model for web services. In: 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), pp. 74–79 (2006)Google Scholar
  12. 12.
    Unal, D., Caglayan, M.: A formal role-based access control model for security policies in multi-domain mobile networks. Computer Networks 57(1), 330–350 (2013)CrossRefGoogle Scholar
  13. 13.
    Yong, H.: Reputation and role based access control model for multi-domain environments. In: 2010 International Symposium on Intelligence Information Processing and Trusted Computing (IPTC), pp. 597–600 (2010)Google Scholar
  14. 14.
    Alcaraz Calero, J., Edwards, N., Kirschnick, J., Wilcock, L., Wray, M.: Toward a multi-tenancy authorization system for cloud services. IEEE Security and Privacy 8(6), 48–55 (2010)CrossRefGoogle Scholar
  15. 15.
    Tang, B., Li, Q., Sandhu, R.: A multi-tenant rbac model for collaborative cloud services. In: 2013 Eleventh Annual International Conference on Privacy, Security and Trust (PST), pp. 229–238 (2013)Google Scholar
  16. 16.
    Wang, L., Wang, B.: Attribute-based access control model for web services in multi-domain environment. In: 2010 International Conference on Management and Service Science (MASS), pp. 1–4 (2010)Google Scholar
  17. 17.
    Lianzhong, L., Peng, L.: A trusted role-based access control model for dymanic collaboration in a federated environment. In: 2008 6th IEEE International Conference on Industrial Informatics (INDIN), pp. 203–208 (2008)Google Scholar
  18. 18.
    Nimkar, A.V., Ghosh, S.K.: A theoretical study on access control model in federated systems. In: Martínez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds.) SNDS 2014. CCIS, vol. 420, pp. 310–321. Springer, Heidelberg (2014)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Indian Institute of TechnologyKharagpurIndia

Personalised recommendations