Secure Data Verification and Virtual Machine Monitoring

  • Authors

    • P. V. Samuel Blessed Nayagam
    • A. Shajin Nargunam
    2018-12-09
    https://doi.org/10.14419/ijet.v7i4.36.24140
  • .
  • Powerfully configurable virtualized assets make the physical area of the information and process autonomous of its portrayal and the clients have no influence over the physical arrangement of information and running procedure. In a multi-cloud condition the layer of deliberation between the physical equipment and virtualized frameworks gives a great way to convey cost reserve funds through server union and also expanded operational productivity and adaptability. This additional usefulness presents a virtualization layer that it turns into a chance of assault for the facilitated virtual administrations. The proposed access control show ensures virtual machines by receiving access control at various layers. The information shading plan help to secure the virtualized information utilized in the virtual machines. The information confirmation structure, which gives a grouping of trust wipes out the untrusted special virtual machines, and additionally utilize the confided in processing standards to guarantee the respectability of the checking condition. Safeguarding security plot ceaselessly screens the working and trade of information between the virtual machine. The test results demonstrate that this plan can viably counteract virtual machine escape without influencing the general productivity of the framework.

     

  • References

    1. [1] Madnick SE & Donovan JJ, “Application and Analysis of the Virtual Machine Approach to Information System Security and Isolationâ€, Proceedings of Workshop on Virtual Computer Systems, (1973), pp.210–224.

      [2] Scott K & Davidson JW, “Safe Virtual Execution using Software Dynamic Translationâ€, Proc. 18th Ann. Computer Security Applications Conference, (2002), pp.209–218.

      [3] Payne BD, de Carbone M & Lee W, “Secure and Flexible Monitoring of Virtual Machinesâ€, Proceedings of 23rd Annals Computer Security Applications Conference, (2007), pp.385–397.

      [4] Garfinkel T & Rosenblum M, “A Virtual Machine Introspection Based Architecture for Intrusion Detectionâ€, Proceedings of Network and Distributed Systems Security Symposium, (2003), pp. 191–206.

      [5] Pham C, Estrada Z, Cao P, Kalbarczyk Z & Iyer RK, “Reliability and security monitoring of virtual machines using hardware architectural invariantsâ€, 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, (2014), pp.13-24.

      [6] Shen J, Zhou T, He D, Zhang Y, Sun X & Xiang Y, “Block design-based key agreement for group data sharing in cloud computingâ€, IEEE Transactions on Dependable and Secure Computing, (2017), pp.1-1.

      [7] Chen F, Xiang T, Yang Y & Chow SSM, “Secure cloud storage meets with secure network codingâ€, IEEE INFOCOM, (2014), pp. 673–681.

      [8] Shen J, Tan H, Moh S, Chung I & Wang J, “An efficient RFID authentication protocol providing strong privacy and securityâ€, Journal of Internet Technology, Vol.17, No.3, (2016).

      [9] Zhou L, Varadharajan V & Hitchens M, “Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storageâ€, IEEE Transactions On Information Forensics And Security, Vol.10, No.11, (2015).

      [10] Yu J, Ren K & Wang C, “Enabling cloud storage auditing with verifiable outsourcing of key updatesâ€, IEEE Transactions on Information Forensics and Security, Vol.11, No.6, (2016).

      [11] Shen J, Shen J, Chen X, Huang X & Susilo W, “An efficient public auditing protocol with novel dynamic structure for cloud dataâ€, IEEE Transactions on Information Forensics and Security, (2017).

      [12] Zeb T, Ghafoor A, Shibli A & Yousaf M, “A secure architecture for inter-cloud virtual machine migrationâ€, 10th International Conference on Security and Privacy in Communication Networks (SecureComm), (2014).

      [13] Yu S, Wang C, Ren K & Lou W, “Achieving secure, scalable, and fine-grained data access control in cloud computingâ€, Proceedings of IEEE INFOCOM, (2010), pp.1–9.

  • Downloads

  • How to Cite

    V. Samuel Blessed Nayagam, P., & Shajin Nargunam, A. (2018). Secure Data Verification and Virtual Machine Monitoring. International Journal of Engineering & Technology, 7(4.36), 574-579. https://doi.org/10.14419/ijet.v7i4.36.24140