publication . Preprint . 2016

Security Management Model in Cloud Computing Environment

Ahmadpanah, Seyed Hossein;
Open Access English
  • Published: 27 Nov 2016
Abstract
In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which virtual machine security architecture, based on AHP (Analytic Hierarchy Process) virtual machine deployment and scheduling method, based on CUSUM (Cumulative Sum) DDoS attack detection algorithm, and the above-described method for functional testing and validation.
Subjects
free text keywords: Computer Science - Networking and Internet Architecture, Computer Science - Distributed, Parallel, and Cluster Computing
Download from

[1] Khan, A.U.R.; Othman, M.; Feng Xia; Khan, A.N. Context-Aware Mobile Cloud Computing and Its Challenges[J], IEEE Cloud Computing, 2015, 2(3): 42- 49

[2] Jain, R.; Paul, S. Network virtualization and software defined networking for cloud computing: a survey[J], IEEE Communications Magazine. 2013, 51(11): 24-31

[3] Wei, Z., Xiaolin, G., Wei, H. R., & Si, Y. (2012). TCP DDOS attack detection on the host in the KVM virtual machine environment. 2012 IEEE/ACIS 11th International Conference on Computer and Information Science. doi:10.1109/icis.2012.105

[4] YamunaDevi, L.; Aruna, P.; Sudha, D.D.; Priya, N. Security in Virtual Machine Live Migration for KVM[A], YamunaDevi, 2011 International Conference on Process Automation, Control and Computing (PACC)[C], USA:IEEE Computer Society Press,2011.1-6

[5] Danev B, Jayaram M R,Karame G O, et al. Enabling secure VM-vTPM migration in private clouds[A], Danev, 240 the 27th Annual Computer Security Applications Conference[C],USA: ACM Press, 2011.187-196.

[6] Fen Y, Yiqun C, Hao H, et al. Detecting DDoS attack based on compensation non-parameter CUSUM algorithm[J]. Journal on Communications, 2008, 29(6): 126-132.

[7] Pu Xl. On the improving of cumulative sum chart[J]. ACTA Mathematicae Applicatae SINICA, 2003,26(2):226−241. 245

[8] Moustakides GV. Performance of CUSUM tests for detecting changes in continuous time processes[A].Moustakides,IEEE International Symposium on Information Theory[C]. USA:IEEE Computer Society Press,2002.186−187

[9] Hussein, Nidal Hassan, and Ahmed Khalid. "A survey of Cloud Computing Security challenges and solutions." International Journal of Computer Science and Information Security 14.1 (2016): 52.

[10] Guana, Zhi-Tao, and Ting-Ting Yangb. "Research on challenges and security of access control models for mobile cloud computing." Wireless Communication and Network: Proceedings of 2015 International Workshop on Wireless Communication and Network (IWWCN2015). World Scientific, 2015.

[11] Dinh, Hoang T., et al. "A survey of mobile cloud computing: architecture, applications, and approaches." Wireless communications and mobile computing 13.18 (2013): 1587-1611.

Abstract
In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which virtual machine security architecture, based on AHP (Analytic Hierarchy Process) virtual machine deployment and scheduling method, based on CUSUM (Cumulative Sum) DDoS attack detection algorithm, and the above-described method for functional testing and validation.
Subjects
free text keywords: Computer Science - Networking and Internet Architecture, Computer Science - Distributed, Parallel, and Cluster Computing
Download from

[1] Khan, A.U.R.; Othman, M.; Feng Xia; Khan, A.N. Context-Aware Mobile Cloud Computing and Its Challenges[J], IEEE Cloud Computing, 2015, 2(3): 42- 49

[2] Jain, R.; Paul, S. Network virtualization and software defined networking for cloud computing: a survey[J], IEEE Communications Magazine. 2013, 51(11): 24-31

[3] Wei, Z., Xiaolin, G., Wei, H. R., & Si, Y. (2012). TCP DDOS attack detection on the host in the KVM virtual machine environment. 2012 IEEE/ACIS 11th International Conference on Computer and Information Science. doi:10.1109/icis.2012.105

[4] YamunaDevi, L.; Aruna, P.; Sudha, D.D.; Priya, N. Security in Virtual Machine Live Migration for KVM[A], YamunaDevi, 2011 International Conference on Process Automation, Control and Computing (PACC)[C], USA:IEEE Computer Society Press,2011.1-6

[5] Danev B, Jayaram M R,Karame G O, et al. Enabling secure VM-vTPM migration in private clouds[A], Danev, 240 the 27th Annual Computer Security Applications Conference[C],USA: ACM Press, 2011.187-196.

[6] Fen Y, Yiqun C, Hao H, et al. Detecting DDoS attack based on compensation non-parameter CUSUM algorithm[J]. Journal on Communications, 2008, 29(6): 126-132.

[7] Pu Xl. On the improving of cumulative sum chart[J]. ACTA Mathematicae Applicatae SINICA, 2003,26(2):226−241. 245

[8] Moustakides GV. Performance of CUSUM tests for detecting changes in continuous time processes[A].Moustakides,IEEE International Symposium on Information Theory[C]. USA:IEEE Computer Society Press,2002.186−187

[9] Hussein, Nidal Hassan, and Ahmed Khalid. "A survey of Cloud Computing Security challenges and solutions." International Journal of Computer Science and Information Security 14.1 (2016): 52.

[10] Guana, Zhi-Tao, and Ting-Ting Yangb. "Research on challenges and security of access control models for mobile cloud computing." Wireless Communication and Network: Proceedings of 2015 International Workshop on Wireless Communication and Network (IWWCN2015). World Scientific, 2015.

[11] Dinh, Hoang T., et al. "A survey of mobile cloud computing: architecture, applications, and approaches." Wireless communications and mobile computing 13.18 (2013): 1587-1611.

Any information missing or wrong?Report an Issue