The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computation outsourcing using virtual appliance is getting prevalent in cloud computing. However, with both hardware and software being controlled by potentially curious or even malicious cloud operators, it is no surprise to see frequent reports of security accidents, like data leakages or abuses. This paper proposes Kite, a hardware-software framework that guards the security of tenant’s virtual...
The past few years have seen radical shifts in the way software is developed, in terms of both process and the technology stack. We must actively track these changes to ensure that software security solutions remain relevant.
With the development of cloud computing, there is a growing number of virtual machines (VMs) in the IaaS cloud. The VM owners can install different kinds of software on demand. However, if the software is not updated in time, it would be a great threat to the security of the cloud. But for the VM owners, it is a tedious task to keep all of the installed software up to date. In this paper we present...
Cloud computing is based on virtualization, where a single physical resource is virtualized into multiple virtual resources. Processor and network virtualization offer many advantages like saving in hardware cost, energy consumption, human effort and management of resources. In this paper we have evaluated the effect of network and processor virtualization using popular open source tools, Open vSwitch...
Software development is not only a single motive process as development but also have to handle number of different issues as like security. For basic software development, we generally use SDLC models for development like web projects, applications, services etc. but in this development process we are not taking care of security issues which are demand of these days. There is no central body who...
In cloud computing, hypervisor is the all-powerful software running in the highest privilege layer, thus attackers who compromise a hypervisor may jeopardize the whole cloud, especially cause memory corruption of any sensitive workloads within the cloud. In this paper, we propose a novel architecture and approach to provide memory protection from an untrusted hypervisor on current x86 platforms. Unlike...
For some years now, the concept of Cloud Computing (CC) is presented as the new revolution of information technology. It presents not only a technical innovation for better IT system flexibility, improvement of working methods and cost control, but also a new economic model, built around the concept of IT Services that are identifiable, classifiable and countable for end users, who can benefit by...
In cloud computing environment, software service often collaborates with other supporting utility services in order to provide a complete solution to end users. The software service itself could provide the required functions to users that fulfill their needs. However, the non-functional requirements, which represent the main criteria in the service selection process, need the collaboration from all...
As any new technology advancement, cloud computing also creates disruptive possibilities and security risk potentials. Virtualization which are the engine that drives cloud computing turns the data center into self-managing, highly scalable, highly available and pools of easily consumable resources. The increase in virtualization and usage of virtual machines (VM) in cloud computing environment has...
Recent years have witnessed the development of Cloud Computing. The management of images is a big problem in virtualized environment because there are quantities of Virtual Machine images being stored in a Cloud and most of them are outdated. How to detect the outdated images and patch them efficiently? In this paper, we present a prototype called OPS- Offline Patching Scheme for the Images Management...
A key technology of cloud computing is virtualization, which can lead to reduce the total cost and increase the application flexibility. However along with these benefits come added security challenges. The extension of Trusted Computing to virtual environments can provide secure storage and ensure system integrity. In this paper, we describe and analyze several existing virtualization of TPM (vTPM)...
Validation of configuration and security compliance at the time of creating new service is an important part of service management process and governance in most IT delivery organizations. It is performed to ensure that security risks, governance controls and vulnerabilities are proactively managed through the lifecycle of the services, and to guarantee that all discovered problems and issues are...
The monitoring of modern large scale infrastructure systems often relies on complex event processing (CEP) rules to detect security and performance problems. For example, the continuous monitoring of compliance to regulatory requirements such as PCI-DSS and NERC CIP requires analyzing events to identify if specific conditions over the configurations of devices occur. In multi-organization systems,...
A common approach in Infrastructure-as-a-Service Clouds or virtualized Grid computing is to provide virtual machines to customers to execute their software remotely. While giving full super user permissions eases the installation and use of a customer's software, it may lead to security issues. Providers usually delegate the task of keeping virtual machines up to date to the customer, while the customer...
We propose a cloud contextualization mechanism which operates in two stages, contextualization of VM images prior to service deployment (PaaS level) and self-contextualization of VM instances created from the image (IaaS level). The contextualization tools are implemented as part of the OPTIMIS Toolkit, a set of software components for simplified management of cloud services and infrastructures. We...
An architecture for dynamic security monitoring and enforcement for client software running in virtualized environments is presented. Virtualization is heavily used in cloud computing in order to allow a proper trade-off between isolation and resource usage. In this new architecture, monitoring mechanisms check a set of policy-defined conditions at runtime in order to detect threats or anomalous behaviour...
Biometric Authentication as a Service is an innovative approach for strong authentication in web environments based on the Software as a Service model. However, both the adoption of SaaS systems and biometric technologies negatively correlate with perceived privacy and data protection risks. We specify a list of evaluation criteria for BioAaaS systems from a data protection point of view including...
Cloud Computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, a major barrier for cloud adoption is real and perceived lack of security. In this paper, we take a holistic view of cloud computing security - spanning across the possible issues and vulnerabilities connected with virtualization infrastructure, software platform, identity...
This paper presents a comprehensive system architecture, which adopts private cloud computing as the deployment model for consolidating IT services and data centers across different agencies within Taiwan Environmental Protection Administration (EPA). Through a number of well-planned procedures we integrates original 130 servers into 25 servers and merges 9 data centers into 2 data centers. The project...
The worldwide revolution in Internet is changing our lives in terms of the way we work, learn and interact. These changes naturally should reflect the way government functions in terms of the organization of the government, its relationship with its citizens, institutions and businesses and cooperation with other governments. E-Governance, especially in developing countries, is looked upon as a means...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.