SlideShare a Scribd company logo
1 of 5
Download to read offline
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303
IJTET©2015 69
SVAC Firewall Restriction with Security in Cloud over
Virtual Environment
NasrinSulthana.M1
1
Rajalakshmi Engineering College, CSE,
Sulthananasrin92@gmail.com
Sujitha.G2
2
Rajalakshmi Engineering College, CSE,
Sujitha.g@rajalakshmi.edu.in
Abstract— Cloud computing is so named for the reason that the information being accessed is found in the "clouds", it
does not entail a user to be in a precise place. Organizations found that cloud computing allows them to diminish the cost
of information management, in view of the fact that they are not obligatory to own their own servers. They can use
capacity leased from third parties. It is more important to store and to secure the data in the cloud. It plays a vital role in
the cloud. The data that can be secured by implementing SVAC (Security Virtualization Architecture for Cloud) Firewall
in the virtual environment. An effectual firewall security has been implemented for jamming and filtering the superfluous
requests coming from the clients prior to the request move towards the virtual machine. Next step is to secure the users.
During the demand dispensation, if the abuser requests the sophisticated of information from the cloud, then based on the
compensation prepared by the cloud client, they can access the data from the cloud server. This paper shows the
architecture and the unwanted request can be restricted through SVAC firewall also how the high level of data that can be
accessed by the highly authorized user.
Index Terms—SVAC firewall, virtual environment, filtering, payment, superfluous, obligatory, compensation, dispensation, sophisticated,
authorized.
————————————————————
1 INTRODUCTION
Nthe cloud computing the user can give the request to the cloud
server. The cloud server can receive the request and response to
the request by providing the cloud services. In between the request
will be passed through the virtual machine. The virtual machine is
nothing but the environment that can be virtually created inside the
physical machine. In the virtual machine the SVAC firewall can be
created to stop the unwanted request from the clients. Many clients
are there to send the request. The firewall can receiveand check those
requests, whether it is a wanted or unwanted request. If the request is
a wanted request, then it forwards to the cloud server. Else if the
request is an unwanted request, then the request will be stopped
there. There is also one more issue that is one fake client can give
one or more requests continued to attack the server. They can be
traced by tracing their IP and MAC address. Then those addresses
can be blocked permanently. So the fake clients cannot be able to
give the request again.
Security issues in cloud concerns are mainly associated
with the security issues faced by cloud service providers and the
service issues faced by the cloud customers.There are three types of
services provided by the cloud providers. They are IaaS(Information
as a Service), Paas(Platform as a service), SaaS(Software as a
Service).IaaSis the hardware and software that enables it all servers,
storage, networks, operating systems. PaaS is the set of services and
tools intended to make coding and deploying those applications
rapidandresourceful. In the PaaSmodels, cloud providers transport a
computing display place, mutually withthe operating system,
database, programming language execution environment,web server.
Application developers can build upand run their software solutions
on a cloud platform devoid of the expenditureandintricacy of buying
and managing the crucial hardware and software layers. SaaS
applications are deliberate for end-users, delivered over the web. In
the business model by means of software as a service (SaaS), users
are provided right of entry to databases and application software.
Cloud providers organize the infrastructure and platforms that lope
the applications. SaaS is occasionally referred to as "on-demand
software" that is recurrently priced on a pay-per-use basis. SaaS
providers usuallycharge applications using a subscription fee. There
is also another method to secure the client. The entire client in the
cloud must be an authorized client. The clients must have the
individual login to store and access data in the cloud. The highly
authenticated user can pay toaccess the highly authenticated data.
2RELATED WORK
Providing security in cloudpreference is a colossal amount of
pay,based on the facility of convention by the clients in the cloud
environment.The widespreadexploit of virtualization in implementing
cloud environment brings inimitable security divine intervention for
the cloud patronsandall resellers&subscribers of a public cloud
service.It has the threat model in which it involves the cloud service
provider. This cloud service provider includes thecloud system
administrators, tenant administrators (or operators) who manage the
tenant virtual machines, and tenant users (or tenant’s customers) who
use the applications and services running in the tenant virtual
machines [1]. This model describes the different types of attacks
from administrators to thevirtual machine or within the virtual
machines and from the virtual machine to the cloud system. This
I
————————————————
 NasrinSulthana.M is currently pursuing masters degree program in
computer science and engineering in Rajalakshmi Engineering College,
India, PH-9600843085. E-mail:sulthananasrin92@gmail.com
 Sujitha.Giscurrently Head of the Department in computer science and
engineering in Rajalakshmi Engineering College, India, PH-9442240274.
E-mail: sujitha.g@rajalakshmi.edu.in
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303
IJTET©2015 70
threat model also detects the attack from the cloud to the internet and
vice versa.
The cloud system which consists of cloud system administrators
and the VMM platform with its privileged domain and hardware.
Then thereis also the cloud cluster domainthat comprising cloud
system domainsthat constitute the cloud infrastructure. VMM is the
Virtual Machine Monitor which is also called as hypervisor. It is a
program that allows multiple operating systems to share a single
hardware host. That means a virtual machine that can be created in
the physical machine. The abundant homomorphic encryption
method allows one to appraise circuits in excess of encrypted data
devoid of that can be able to decrypt. The solution can be produced in
three steps. They are arbitrary circuits, own decryption circuit
andbootstrappable. The public key encryption scheme has four
algorithms keygen, encrypt, decrypt, evaluate. There are three types
of encryption techniques. They are homomorphic encryption, fully
homomorphic encryption and leveled fully homomorphic encryption
[2]. The goal of the VM introspection is to enable the observations of
a VM’s stateand events from outside the VM.
DKSM (Direct Kernel Structure Manipulation) is a type of attack
that can change the syntax and semantics of kernel data structures in
a running guest. The outside observations can have the same
semantic view of the system stateand events if they were seen from
inside the VM. It increases the fault tolerance. This will propose to
observe the virtual machine state and the clients [3].The virtual
machines have been protected through PSVM security model. PSVM
is nothing but a Privilege Separation Virtual Machine. Split up into
two parts. Operations about the user privacy. Managing the user
privacy. Propose a novel method to execute the security of the virtual
machine with the help of firewall to overcome the attackers that can
easily attack the entire data system [4].
SSC (Self Service Cloud Computing) is a new-fangled cloud
computing mould that improves the client sanctuary. It also provides
clients, the suppleness to installfortunate services on their own
VM’s.It uses the VMM that includes large and complex
administrative domain. The client is inflexible to control over their
own virtual machines [5]. Cloud computing resources are handled
through control interfaces. It is done through these interfaces, that the
new machines can be added existing one can be modified and
updated. It only detects the classical attacks from the client. These
can be overcome by Instead of control interface here we will use the
―VM‖ as an interface. It controls all the requests from the client.[6].
There are two types of attackerdetection techniques are used. One is
the Service Provider Attack Detection (SPAD). Another method is
Tenant Specific Attack Detection (TSAD). The attacks are also
detected from the Tenant domain also from the cloud service
provider. Unauthorized user can able to access cloud data, which is
the major drawback. High payable cloud charges to access the data
from the cloud.This system uses the adaptive security algorithm.
Adaptive Security Algorithm (ASA) is the foundation on which the
Firewall is built. It defines and examines the traffic ephemeralin the
course of it and applies assorted rules to it. The
indispensableperception behind ASA is to maintain track of the
assortment of requests being sent to cloud server.Based on the
information togetherconcerning the cloud request, ASA allows
packets to come rear into the confidential network during the
firewall. All additional traffic intended for the private network
andupcoming to the firewall is blocked.
3 PROPOSED SYSTEM
In the proposed system, there is a cloud which stores all the types of
data such as texts, videos, music, files, and all the multimedia data.
Some of the data are very confidential which are also stored in the
cloud itself. There are so many clients to access the data from the
cloud. They can access it only through the virtual machine by
sending the request. The virtual machine sends the requests to the
cloud server, retrieve the information and pass it to the client.
Likewise all the users can send the request. There is a type of attack
in which the fake user can send the fake request to the server. In
order to block the fake request SVAC Firewall is created inside the
virtual machine. SVAC firewall is nothing but a firewall whichis a
set of interrelated programs, placed at a network gateway server that
protects the resources of a private network from users from other
networks. It verifies first the request will be a wanted request or
unwanted request.
If it is a wanted request thenit will be granted from the client to
the cloud server. If the request is an unwanted request then those
requests will be dropped in this virtual machine itself. It is not raised
to the cloud server. If an attacker wants to attack the virtual machine
then it becomes a major drawback. At this time the firewall detects
the MAC and IP address of the system where the continuous request
will be received. After finding the addresses then such system will be
blocked. So such type of user cannot able to raise the fake requests
again and again. There is a one more system to secure the user. Only
high authenticated user can pay more and can access the highly
confidential data. The following figure shows the architecture of the
SVAC firewall restriction.
Figure 1 shows client system sends the request through the
firewall to the virtual machine the unwanted requests will be stopped
Fig 1. Architecture of the SVAC Firewall Restriction
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303
IJTET©2015 71
there in the firewall. Other requests will be forwarded to the virtual
machine and those will be raised to the cloud server. If any of the
requesting high level data means then they will pay more and access
the data from the cloud.
Figure 2 shows that the request will be raised to the firewall. The
firewall verifies the request. If the request will be a wanted request
then it sends the request to the virtual machine and then to the cloud
server.
If the unauthorized person sends the unwanted request then it will
be stopped by the firewall. The system information such as MAC
address and IP address will be traced also they can be blocked
permanently. The high authenticated user can pay more and access
the high level of data from the cloud server.
3.1 SVAC Firewall Restriction Algorithm:
1. The SVAC Firewall Restriction Algorithm tends to validate
the request over theprivate cloud network.
2. Outgoing requests from trusted hosts to cloud server is
verified by the SVAC Algorithm.
3. Filtering to be done at virtual operating systems firewall
protection is done based on SVAC firewall restriction
algorithm.
4 MODULES
1. Firewall rule execution
2. Virtualized firewall creation
3. Data access module
4. Cost computation module
5. Blocked user access module
6. MAC privilege module
7. System Information module
8. Performance evolution module
4.1 Firewall Rule Creation
In this module, a Firewall is a system designed to prevent
unauthorized access to or from a private network (especially
Intranets).Create a firewall rule that permits the ping command first
and customize the icmpv type.Using this rule to deploy all windows
server and create a specific filter.Using this rule to verify the remote
servers and work stations along with ping configuration.
4.2 Virtualized Firewall Creation
In this module, a firewall product is required to support virtual
devices in most of its firewall features.In network configured zones,
not obligatory to configure security policy for every interface in a
firewall network.Build resource based packet filtering inside same
virtual device to remove zones in a network. RBPF in different
virtual devices are also accepted.
4.3Data Access Module
If the IP address of demand is inside one of the ranges particular in
server stage firewall policy, the association is approved to SQL
Database server has a harmonizing database-level statute.If the IP
address demand is not inside the ranges precise in server level
firewall rules mean, connection failed otherwise database firewall
rules are checked.The connection established only when the client
passes through firewall in SQL database.
4.4Cost Computation Module
Flexible cloud hosting services, reliable and secure information all
those involved in cost computation.It produces very low rate for the
compute capacity is actually consuming and produce high
performance over data.Having route access to each one and interact
among machine, retaining data based on boot partition furthermore
added an advantage.
4.5 Blocked User Module
Firewall that allows to block programs from being accessed by other
people on the internet or network. It helps to keep computer
secure.Testing a blocking rule, this rule used to test the website and
block the website by network administrator.To create a content filter
to block user access in group of websites in a
network.Troubleshooting the block page to avoid unauthorized
person using a network.
4.6MAC Privilege Module
Mac address is a unique address assigned to almost all networking
hardware’s (ex: mobile phones).Creating firewall rules based on Mac
address this also very effective while accessing system from cloud
server.It addresses filters to prevent devices from sending outgoing
TCP/UDP traffic to the WAN.
4.7System Information Module
Mostly to check whether the person is authenticated user or
unauthenticated user in a database while access the information in
cloud server.Authenticated user information is stored in database this
Fig 2. Flow of request from client to cloud server
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303
IJTET©2015 72
helps to make a user to access the cloud server. The system
information (IP address, Mac address) are also checked in a database
to allow the user to make use of the system.
4.8 Performance Evolution Module
Adoption of cloud, virtualization and mobility providing more
vulnerabilities than ever for hackers to exploit. Now a day, Firewall
performance based on shares and information about applications,
attack signatures and address is amplified. Firewall needs to manage
flows between tiers of virtualized servers to increase the performance
in a line-server.
Figure 3 shows the observations between the process that
are executed by the kernel mind denoted in minutes per second and
the process that are executed in the user time denoted in minutes per
second. The performance is compared for both the kernel mind and
the user time. The process in the user time is always greater than the
process by the kernel mind.
Figure 4 indicates the execution details. It is based on total
read, total write, total error and total correction. Initially the read
process is very high and it is gradually decreases. After write process
the error will be minimized and the appropriate correction actions
will be taken. The corrections will be made more than the errors.
5 CONCLUSION
In this paper we proposed the security architecture having SVAC
firewall to stop the unwanted request from the fake user and it also
block the attackers who sends more fake request continuously to the
cloud server by tracing the MAC address and IP address from the
system information. This proposed system also leads security to the
individual user by providing high authorization to access the data
from the cloud server. The highly authorized user can pay more to
access more confidential data from the cloud.
6 REFERENCE
[1]. Vijay Varadharajan, Senior Member, IEEE,andUdayaTupakula,
Member, IEEE, ―Security as a Service Model for Cloud
Environment,‖IEEE transactions on network and service management,
vol. 11, no. 1, march 2014.
[2]. C. Gentry, ―Fully homomorphic encryption using ideal lattices,‖ in
Proc. 2009ACM Symp. Theory Comput.
[3].S. Bahram, et al., ―DKSM: subverting virtual machine introspection
for fun and profit,‖ in Proc. 2010 IEEE Symp. Reliable Distrib. Syst.
[4].C. Yu, et al., ―Protecting the security and privacy of the virtual
machine through privilege separation,‖ in Proc. 2013 Int. Conf. Comput.
Sci. Electron. Eng.
[5]. S. Butt, et al., ―Self-service cloud computing,‖ in Proc. 2012 ACM
Comput. Commun Security Conf.
Fig 3. Observation between Process kernel mind in M/Sec and
Process user time in M/Sec
Fig 4. Execution details for the virtual machine based on total read,
total write, toatal error and total corrections
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303
IJTET©2015 73
[6]. J. Somorovsky, et al., ―All your clouds belong to us—security
analysis of cloud management interfaces,‖ in 2011 ACM Comput.
Commun. Security Conf.
[7]. V. Varadarajan, et al., ―Resource-freeing attacks: improve your
cloudperformance (at your neighbor’s expense),‖ in Proc. 2012 ACM
Comput.Commun. Security Conf.
[8]. T. C. Chieu, et al., ―Dynamic scaling of web applications in a
virtualized cloud computing environment,‖ in Proc. 2009 IEEE Int. Conf.
e-Business Eng.
[9]. J.H. An, Y. Dodis, and T. Rabin. On the security of jointsignature
and encryption.Eurocrypt ’02, pp. 83–107.
[10]. R. Rivest, A. Shamir, and L. Adleman. A method for obtaining
digital signatures and public-key cryptosystems. In Comm. of the ACM,
21:2, pages 120–126, 1978.
[11]. P. C. van Oorschot, A. Somayaji, andG.Wurster. Hardware-
Assisted Circumvention of Self-Hashing Software Tamper Resistance.
IEEE Trans. Dependable Secur. Comput., 2(2):82–92, 2005.
[12]. Hidekazu Tadokoro, Kenichi Kourai, Shigeru Chiba. Preventing
Information Leakage from Virtual Machines’ Memory in IaaS Clouds.
IPSJ Transactions on Advanced Computing Systems Vol.5 No.4 101–
111.2012.
[13]. Chunxiao Li, AnandRaghunathan, Niraj K. Jha. Secure
VirtualMachine Execution under an Untrusted Management OS [C].
2010IEEE 3rd International Conference on Cloud Computing,2011
[14]. B. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An
architecturefor secure active monitoring using virtualization. In IEEE
Symposiumon Security & Privacy, 2008.
[15]. M. Christodorescu, R. Sailer, D. Schales, D. Sgandurra, and D.
Zamboni.Cloud Security Is Not (Just) Virtualization Security. In
ACMCloud Computing Security Workshop, 2009.
[16.] F. Zhang, J. Chen, H. Chen, and B. Zang. CloudVisor:
RetrofittingProtection of Virtual Machines in Multi-tenant Cloud with
NestedVirtualization. In ACM SOSP, 2011.
[17]. Gajek, S., Jensen, M., Liao, L., andSchwenk, J.
Analysis of signature wrapping attacks and countermeasures. In ICWS
(2009), IEEE, pp. 575-582.
[18]. Ristenpart, T., Tromer, E., Shacham, H., and Savage, S. Hey, you,
get o_ of my cloud: exploring
information leakage in third-party compute clouds. In
CCS '09: Proceedings of the 16th ACM conference on Computer and
communications security (New York, NY, USA, 2009), ACM, pp. 199-
212.

More Related Content

What's hot

Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...IJIR JOURNALS IJIRUSA
 
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...IRJET Journal
 
Security Risk Assessment for Quality Web Design
Security Risk Assessment for Quality Web DesignSecurity Risk Assessment for Quality Web Design
Security Risk Assessment for Quality Web DesignTing Yin
 
Double guard: Detecting Interruptions in N- Tier Web Applications
Double guard: Detecting Interruptions in N- Tier Web ApplicationsDouble guard: Detecting Interruptions in N- Tier Web Applications
Double guard: Detecting Interruptions in N- Tier Web ApplicationsIJMER
 
Common Types of DDoS Attacks | MazeBolt Technologies
Common Types of DDoS Attacks | MazeBolt TechnologiesCommon Types of DDoS Attacks | MazeBolt Technologies
Common Types of DDoS Attacks | MazeBolt TechnologiesMazeBolt Technologies
 
Resarch paper i cloud computing
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computingBharat Gupta
 
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBoltDDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBoltMazeBolt Technologies
 
DDoS Defenses | DDoS Protection and Mitigation | MazeBolt
DDoS Defenses | DDoS Protection and Mitigation | MazeBoltDDoS Defenses | DDoS Protection and Mitigation | MazeBolt
DDoS Defenses | DDoS Protection and Mitigation | MazeBoltMazeBolt Technologies
 
Stealthy Denial of Service Strategy in Cloud Computing
Stealthy Denial of Service Strategy in Cloud Computing Stealthy Denial of Service Strategy in Cloud Computing
Stealthy Denial of Service Strategy in Cloud Computing 1crore projects
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud allan sam
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Cross domain security reference architecture
Cross domain security reference architectureCross domain security reference architecture
Cross domain security reference architectureWen Zhu
 
Cloud security and services
Cloud security and servicesCloud security and services
Cloud security and servicesJas Preet
 
IRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using KerberosIRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using KerberosIRJET Journal
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments IJITCA Journal
 

What's hot (20)

Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
 
Ea33762765
Ea33762765Ea33762765
Ea33762765
 
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
 
REPORT1 new
REPORT1 newREPORT1 new
REPORT1 new
 
Security Risk Assessment for Quality Web Design
Security Risk Assessment for Quality Web DesignSecurity Risk Assessment for Quality Web Design
Security Risk Assessment for Quality Web Design
 
Double guard: Detecting Interruptions in N- Tier Web Applications
Double guard: Detecting Interruptions in N- Tier Web ApplicationsDouble guard: Detecting Interruptions in N- Tier Web Applications
Double guard: Detecting Interruptions in N- Tier Web Applications
 
Common Types of DDoS Attacks | MazeBolt Technologies
Common Types of DDoS Attacks | MazeBolt TechnologiesCommon Types of DDoS Attacks | MazeBolt Technologies
Common Types of DDoS Attacks | MazeBolt Technologies
 
Resarch paper i cloud computing
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computing
 
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBoltDDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
 
DDoS Defenses | DDoS Protection and Mitigation | MazeBolt
DDoS Defenses | DDoS Protection and Mitigation | MazeBoltDDoS Defenses | DDoS Protection and Mitigation | MazeBolt
DDoS Defenses | DDoS Protection and Mitigation | MazeBolt
 
Stealthy Denial of Service Strategy in Cloud Computing
Stealthy Denial of Service Strategy in Cloud Computing Stealthy Denial of Service Strategy in Cloud Computing
Stealthy Denial of Service Strategy in Cloud Computing
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
D do s
D do sD do s
D do s
 
Cross domain security reference architecture
Cross domain security reference architectureCross domain security reference architecture
Cross domain security reference architecture
 
Cloud security and services
Cloud security and servicesCloud security and services
Cloud security and services
 
IRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using KerberosIRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using Kerberos
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 

Similar to SVAC Firewall Restriction with Security in Cloud over Virtual Environment

A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environmentsmlaij
 
IRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET- Developing an Algorithm to Detect Malware in CloudIRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET- Developing an Algorithm to Detect Malware in CloudIRJET Journal
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platformsPrabhat gangwar
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud EnvironmentKaashivInfoTech Company
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET Journal
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudSwapna Shetye
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
IDSaaS: Intrusion Detection System as a Service in Cloud
IDSaaS: Intrusion Detection System as a Service in CloudIDSaaS: Intrusion Detection System as a Service in Cloud
IDSaaS: Intrusion Detection System as a Service in CloudIRJET Journal
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
 
Windstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud SecurityWindstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud SecurityJason Proctor
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesTechsparks
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
A SURVEY ON SECURITY CHALLENGES OF VIRTUALIZATION TECHNOLOGY IN CLOUD COMPUTING
A SURVEY ON SECURITY CHALLENGES OF VIRTUALIZATION TECHNOLOGY IN CLOUD COMPUTINGA SURVEY ON SECURITY CHALLENGES OF VIRTUALIZATION TECHNOLOGY IN CLOUD COMPUTING
A SURVEY ON SECURITY CHALLENGES OF VIRTUALIZATION TECHNOLOGY IN CLOUD COMPUTINGijcsit
 

Similar to SVAC Firewall Restriction with Security in Cloud over Virtual Environment (20)

A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
 
IRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET- Developing an Algorithm to Detect Malware in CloudIRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET- Developing an Algorithm to Detect Malware in Cloud
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
C43021014
C43021014C43021014
C43021014
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
IDSaaS: Intrusion Detection System as a Service in Cloud
IDSaaS: Intrusion Detection System as a Service in CloudIDSaaS: Intrusion Detection System as a Service in Cloud
IDSaaS: Intrusion Detection System as a Service in Cloud
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
Quiz 1 cloud computing
Quiz 1 cloud computing Quiz 1 cloud computing
Quiz 1 cloud computing
 
Windstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud SecurityWindstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud Security
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
A SURVEY ON SECURITY CHALLENGES OF VIRTUALIZATION TECHNOLOGY IN CLOUD COMPUTING
A SURVEY ON SECURITY CHALLENGES OF VIRTUALIZATION TECHNOLOGY IN CLOUD COMPUTINGA SURVEY ON SECURITY CHALLENGES OF VIRTUALIZATION TECHNOLOGY IN CLOUD COMPUTING
A SURVEY ON SECURITY CHALLENGES OF VIRTUALIZATION TECHNOLOGY IN CLOUD COMPUTING
 

More from IJTET Journal

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityIJTET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesIJTET Journal
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterIJTET Journal
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
 

More from IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

SVAC Firewall Restriction with Security in Cloud over Virtual Environment

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303 IJTET©2015 69 SVAC Firewall Restriction with Security in Cloud over Virtual Environment NasrinSulthana.M1 1 Rajalakshmi Engineering College, CSE, Sulthananasrin92@gmail.com Sujitha.G2 2 Rajalakshmi Engineering College, CSE, Sujitha.g@rajalakshmi.edu.in Abstract— Cloud computing is so named for the reason that the information being accessed is found in the "clouds", it does not entail a user to be in a precise place. Organizations found that cloud computing allows them to diminish the cost of information management, in view of the fact that they are not obligatory to own their own servers. They can use capacity leased from third parties. It is more important to store and to secure the data in the cloud. It plays a vital role in the cloud. The data that can be secured by implementing SVAC (Security Virtualization Architecture for Cloud) Firewall in the virtual environment. An effectual firewall security has been implemented for jamming and filtering the superfluous requests coming from the clients prior to the request move towards the virtual machine. Next step is to secure the users. During the demand dispensation, if the abuser requests the sophisticated of information from the cloud, then based on the compensation prepared by the cloud client, they can access the data from the cloud server. This paper shows the architecture and the unwanted request can be restricted through SVAC firewall also how the high level of data that can be accessed by the highly authorized user. Index Terms—SVAC firewall, virtual environment, filtering, payment, superfluous, obligatory, compensation, dispensation, sophisticated, authorized. ———————————————————— 1 INTRODUCTION Nthe cloud computing the user can give the request to the cloud server. The cloud server can receive the request and response to the request by providing the cloud services. In between the request will be passed through the virtual machine. The virtual machine is nothing but the environment that can be virtually created inside the physical machine. In the virtual machine the SVAC firewall can be created to stop the unwanted request from the clients. Many clients are there to send the request. The firewall can receiveand check those requests, whether it is a wanted or unwanted request. If the request is a wanted request, then it forwards to the cloud server. Else if the request is an unwanted request, then the request will be stopped there. There is also one more issue that is one fake client can give one or more requests continued to attack the server. They can be traced by tracing their IP and MAC address. Then those addresses can be blocked permanently. So the fake clients cannot be able to give the request again. Security issues in cloud concerns are mainly associated with the security issues faced by cloud service providers and the service issues faced by the cloud customers.There are three types of services provided by the cloud providers. They are IaaS(Information as a Service), Paas(Platform as a service), SaaS(Software as a Service).IaaSis the hardware and software that enables it all servers, storage, networks, operating systems. PaaS is the set of services and tools intended to make coding and deploying those applications rapidandresourceful. In the PaaSmodels, cloud providers transport a computing display place, mutually withthe operating system, database, programming language execution environment,web server. Application developers can build upand run their software solutions on a cloud platform devoid of the expenditureandintricacy of buying and managing the crucial hardware and software layers. SaaS applications are deliberate for end-users, delivered over the web. In the business model by means of software as a service (SaaS), users are provided right of entry to databases and application software. Cloud providers organize the infrastructure and platforms that lope the applications. SaaS is occasionally referred to as "on-demand software" that is recurrently priced on a pay-per-use basis. SaaS providers usuallycharge applications using a subscription fee. There is also another method to secure the client. The entire client in the cloud must be an authorized client. The clients must have the individual login to store and access data in the cloud. The highly authenticated user can pay toaccess the highly authenticated data. 2RELATED WORK Providing security in cloudpreference is a colossal amount of pay,based on the facility of convention by the clients in the cloud environment.The widespreadexploit of virtualization in implementing cloud environment brings inimitable security divine intervention for the cloud patronsandall resellers&subscribers of a public cloud service.It has the threat model in which it involves the cloud service provider. This cloud service provider includes thecloud system administrators, tenant administrators (or operators) who manage the tenant virtual machines, and tenant users (or tenant’s customers) who use the applications and services running in the tenant virtual machines [1]. This model describes the different types of attacks from administrators to thevirtual machine or within the virtual machines and from the virtual machine to the cloud system. This I ————————————————  NasrinSulthana.M is currently pursuing masters degree program in computer science and engineering in Rajalakshmi Engineering College, India, PH-9600843085. E-mail:sulthananasrin92@gmail.com  Sujitha.Giscurrently Head of the Department in computer science and engineering in Rajalakshmi Engineering College, India, PH-9442240274. E-mail: sujitha.g@rajalakshmi.edu.in
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303 IJTET©2015 70 threat model also detects the attack from the cloud to the internet and vice versa. The cloud system which consists of cloud system administrators and the VMM platform with its privileged domain and hardware. Then thereis also the cloud cluster domainthat comprising cloud system domainsthat constitute the cloud infrastructure. VMM is the Virtual Machine Monitor which is also called as hypervisor. It is a program that allows multiple operating systems to share a single hardware host. That means a virtual machine that can be created in the physical machine. The abundant homomorphic encryption method allows one to appraise circuits in excess of encrypted data devoid of that can be able to decrypt. The solution can be produced in three steps. They are arbitrary circuits, own decryption circuit andbootstrappable. The public key encryption scheme has four algorithms keygen, encrypt, decrypt, evaluate. There are three types of encryption techniques. They are homomorphic encryption, fully homomorphic encryption and leveled fully homomorphic encryption [2]. The goal of the VM introspection is to enable the observations of a VM’s stateand events from outside the VM. DKSM (Direct Kernel Structure Manipulation) is a type of attack that can change the syntax and semantics of kernel data structures in a running guest. The outside observations can have the same semantic view of the system stateand events if they were seen from inside the VM. It increases the fault tolerance. This will propose to observe the virtual machine state and the clients [3].The virtual machines have been protected through PSVM security model. PSVM is nothing but a Privilege Separation Virtual Machine. Split up into two parts. Operations about the user privacy. Managing the user privacy. Propose a novel method to execute the security of the virtual machine with the help of firewall to overcome the attackers that can easily attack the entire data system [4]. SSC (Self Service Cloud Computing) is a new-fangled cloud computing mould that improves the client sanctuary. It also provides clients, the suppleness to installfortunate services on their own VM’s.It uses the VMM that includes large and complex administrative domain. The client is inflexible to control over their own virtual machines [5]. Cloud computing resources are handled through control interfaces. It is done through these interfaces, that the new machines can be added existing one can be modified and updated. It only detects the classical attacks from the client. These can be overcome by Instead of control interface here we will use the ―VM‖ as an interface. It controls all the requests from the client.[6]. There are two types of attackerdetection techniques are used. One is the Service Provider Attack Detection (SPAD). Another method is Tenant Specific Attack Detection (TSAD). The attacks are also detected from the Tenant domain also from the cloud service provider. Unauthorized user can able to access cloud data, which is the major drawback. High payable cloud charges to access the data from the cloud.This system uses the adaptive security algorithm. Adaptive Security Algorithm (ASA) is the foundation on which the Firewall is built. It defines and examines the traffic ephemeralin the course of it and applies assorted rules to it. The indispensableperception behind ASA is to maintain track of the assortment of requests being sent to cloud server.Based on the information togetherconcerning the cloud request, ASA allows packets to come rear into the confidential network during the firewall. All additional traffic intended for the private network andupcoming to the firewall is blocked. 3 PROPOSED SYSTEM In the proposed system, there is a cloud which stores all the types of data such as texts, videos, music, files, and all the multimedia data. Some of the data are very confidential which are also stored in the cloud itself. There are so many clients to access the data from the cloud. They can access it only through the virtual machine by sending the request. The virtual machine sends the requests to the cloud server, retrieve the information and pass it to the client. Likewise all the users can send the request. There is a type of attack in which the fake user can send the fake request to the server. In order to block the fake request SVAC Firewall is created inside the virtual machine. SVAC firewall is nothing but a firewall whichis a set of interrelated programs, placed at a network gateway server that protects the resources of a private network from users from other networks. It verifies first the request will be a wanted request or unwanted request. If it is a wanted request thenit will be granted from the client to the cloud server. If the request is an unwanted request then those requests will be dropped in this virtual machine itself. It is not raised to the cloud server. If an attacker wants to attack the virtual machine then it becomes a major drawback. At this time the firewall detects the MAC and IP address of the system where the continuous request will be received. After finding the addresses then such system will be blocked. So such type of user cannot able to raise the fake requests again and again. There is a one more system to secure the user. Only high authenticated user can pay more and can access the highly confidential data. The following figure shows the architecture of the SVAC firewall restriction. Figure 1 shows client system sends the request through the firewall to the virtual machine the unwanted requests will be stopped Fig 1. Architecture of the SVAC Firewall Restriction
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303 IJTET©2015 71 there in the firewall. Other requests will be forwarded to the virtual machine and those will be raised to the cloud server. If any of the requesting high level data means then they will pay more and access the data from the cloud. Figure 2 shows that the request will be raised to the firewall. The firewall verifies the request. If the request will be a wanted request then it sends the request to the virtual machine and then to the cloud server. If the unauthorized person sends the unwanted request then it will be stopped by the firewall. The system information such as MAC address and IP address will be traced also they can be blocked permanently. The high authenticated user can pay more and access the high level of data from the cloud server. 3.1 SVAC Firewall Restriction Algorithm: 1. The SVAC Firewall Restriction Algorithm tends to validate the request over theprivate cloud network. 2. Outgoing requests from trusted hosts to cloud server is verified by the SVAC Algorithm. 3. Filtering to be done at virtual operating systems firewall protection is done based on SVAC firewall restriction algorithm. 4 MODULES 1. Firewall rule execution 2. Virtualized firewall creation 3. Data access module 4. Cost computation module 5. Blocked user access module 6. MAC privilege module 7. System Information module 8. Performance evolution module 4.1 Firewall Rule Creation In this module, a Firewall is a system designed to prevent unauthorized access to or from a private network (especially Intranets).Create a firewall rule that permits the ping command first and customize the icmpv type.Using this rule to deploy all windows server and create a specific filter.Using this rule to verify the remote servers and work stations along with ping configuration. 4.2 Virtualized Firewall Creation In this module, a firewall product is required to support virtual devices in most of its firewall features.In network configured zones, not obligatory to configure security policy for every interface in a firewall network.Build resource based packet filtering inside same virtual device to remove zones in a network. RBPF in different virtual devices are also accepted. 4.3Data Access Module If the IP address of demand is inside one of the ranges particular in server stage firewall policy, the association is approved to SQL Database server has a harmonizing database-level statute.If the IP address demand is not inside the ranges precise in server level firewall rules mean, connection failed otherwise database firewall rules are checked.The connection established only when the client passes through firewall in SQL database. 4.4Cost Computation Module Flexible cloud hosting services, reliable and secure information all those involved in cost computation.It produces very low rate for the compute capacity is actually consuming and produce high performance over data.Having route access to each one and interact among machine, retaining data based on boot partition furthermore added an advantage. 4.5 Blocked User Module Firewall that allows to block programs from being accessed by other people on the internet or network. It helps to keep computer secure.Testing a blocking rule, this rule used to test the website and block the website by network administrator.To create a content filter to block user access in group of websites in a network.Troubleshooting the block page to avoid unauthorized person using a network. 4.6MAC Privilege Module Mac address is a unique address assigned to almost all networking hardware’s (ex: mobile phones).Creating firewall rules based on Mac address this also very effective while accessing system from cloud server.It addresses filters to prevent devices from sending outgoing TCP/UDP traffic to the WAN. 4.7System Information Module Mostly to check whether the person is authenticated user or unauthenticated user in a database while access the information in cloud server.Authenticated user information is stored in database this Fig 2. Flow of request from client to cloud server
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303 IJTET©2015 72 helps to make a user to access the cloud server. The system information (IP address, Mac address) are also checked in a database to allow the user to make use of the system. 4.8 Performance Evolution Module Adoption of cloud, virtualization and mobility providing more vulnerabilities than ever for hackers to exploit. Now a day, Firewall performance based on shares and information about applications, attack signatures and address is amplified. Firewall needs to manage flows between tiers of virtualized servers to increase the performance in a line-server. Figure 3 shows the observations between the process that are executed by the kernel mind denoted in minutes per second and the process that are executed in the user time denoted in minutes per second. The performance is compared for both the kernel mind and the user time. The process in the user time is always greater than the process by the kernel mind. Figure 4 indicates the execution details. It is based on total read, total write, total error and total correction. Initially the read process is very high and it is gradually decreases. After write process the error will be minimized and the appropriate correction actions will be taken. The corrections will be made more than the errors. 5 CONCLUSION In this paper we proposed the security architecture having SVAC firewall to stop the unwanted request from the fake user and it also block the attackers who sends more fake request continuously to the cloud server by tracing the MAC address and IP address from the system information. This proposed system also leads security to the individual user by providing high authorization to access the data from the cloud server. The highly authorized user can pay more to access more confidential data from the cloud. 6 REFERENCE [1]. Vijay Varadharajan, Senior Member, IEEE,andUdayaTupakula, Member, IEEE, ―Security as a Service Model for Cloud Environment,‖IEEE transactions on network and service management, vol. 11, no. 1, march 2014. [2]. C. Gentry, ―Fully homomorphic encryption using ideal lattices,‖ in Proc. 2009ACM Symp. Theory Comput. [3].S. Bahram, et al., ―DKSM: subverting virtual machine introspection for fun and profit,‖ in Proc. 2010 IEEE Symp. Reliable Distrib. Syst. [4].C. Yu, et al., ―Protecting the security and privacy of the virtual machine through privilege separation,‖ in Proc. 2013 Int. Conf. Comput. Sci. Electron. Eng. [5]. S. Butt, et al., ―Self-service cloud computing,‖ in Proc. 2012 ACM Comput. Commun Security Conf. Fig 3. Observation between Process kernel mind in M/Sec and Process user time in M/Sec Fig 4. Execution details for the virtual machine based on total read, total write, toatal error and total corrections
  • 5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303 IJTET©2015 73 [6]. J. Somorovsky, et al., ―All your clouds belong to us—security analysis of cloud management interfaces,‖ in 2011 ACM Comput. Commun. Security Conf. [7]. V. Varadarajan, et al., ―Resource-freeing attacks: improve your cloudperformance (at your neighbor’s expense),‖ in Proc. 2012 ACM Comput.Commun. Security Conf. [8]. T. C. Chieu, et al., ―Dynamic scaling of web applications in a virtualized cloud computing environment,‖ in Proc. 2009 IEEE Int. Conf. e-Business Eng. [9]. J.H. An, Y. Dodis, and T. Rabin. On the security of jointsignature and encryption.Eurocrypt ’02, pp. 83–107. [10]. R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. In Comm. of the ACM, 21:2, pages 120–126, 1978. [11]. P. C. van Oorschot, A. Somayaji, andG.Wurster. Hardware- Assisted Circumvention of Self-Hashing Software Tamper Resistance. IEEE Trans. Dependable Secur. Comput., 2(2):82–92, 2005. [12]. Hidekazu Tadokoro, Kenichi Kourai, Shigeru Chiba. Preventing Information Leakage from Virtual Machines’ Memory in IaaS Clouds. IPSJ Transactions on Advanced Computing Systems Vol.5 No.4 101– 111.2012. [13]. Chunxiao Li, AnandRaghunathan, Niraj K. Jha. Secure VirtualMachine Execution under an Untrusted Management OS [C]. 2010IEEE 3rd International Conference on Cloud Computing,2011 [14]. B. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An architecturefor secure active monitoring using virtualization. In IEEE Symposiumon Security & Privacy, 2008. [15]. M. Christodorescu, R. Sailer, D. Schales, D. Sgandurra, and D. Zamboni.Cloud Security Is Not (Just) Virtualization Security. In ACMCloud Computing Security Workshop, 2009. [16.] F. Zhang, J. Chen, H. Chen, and B. Zang. CloudVisor: RetrofittingProtection of Virtual Machines in Multi-tenant Cloud with NestedVirtualization. In ACM SOSP, 2011. [17]. Gajek, S., Jensen, M., Liao, L., andSchwenk, J. Analysis of signature wrapping attacks and countermeasures. In ICWS (2009), IEEE, pp. 575-582. [18]. Ristenpart, T., Tromer, E., Shacham, H., and Savage, S. Hey, you, get o_ of my cloud: exploring information leakage in third-party compute clouds. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security (New York, NY, USA, 2009), ACM, pp. 199- 212.