SELF-AWARE DEPLOYMENT ENFORCEMENT OF VIRTUALIZED AND CLOUD-BASED IMAGES

Ethan Hadar, Irit Hadar, Amir Jerbi, Ethan Hadar, Irit Hadar

Abstract

This position paper presents our approach for deployment enforcement of virtual images (VM), in order to prevent an unauthorized usage, potential insider threat, and theft of VMs. In existing systems, regular images in a virtual environment can be mounted and installed in a different location, while our system prevents the intentional and unintentional roaming of these images, triggered by either humans or automation tools. This paper proposes an approach that secures installation location according to policy in virtualized environments, by intercepting the image installation process.

References

  1. Blum D., Schacter P., Maiwald E., Krikken R., Henry T., Boer M., Chuvakin A., 2011. 2012 Planning Guide: Security and Risk Management, G00224667, Burton IT1 Research, 1 November 2011.
  2. Gurav U., Shaikh R., 2010. Virtualization: a key feature of cloud computing. ICWET 7810 Proceedings of the International Conference and Workshop on Emerging Trends in Technology. Mumbai, India - February 26 - 27, 2010.
  3. Heiser H, Nicolett M, 2008. Assessing the Security Risks of Cloud Computing. Gartner Research Report G00157782, 3 June 2008.
  4. Kresimir P., Zeljko H., 2010. Cloud computing security issues and challenges, MIPRO, 2010 Proceedings of the 33rd International Convention, Opatija, Croatia, 24-28 May 2010.
  5. Lombardi F., Pietro R. D., 2010. Secure virtualization for cloud computing. Journal of Network and Computer Applications, Volume 34, Issue 4, pp. 1113-1122.
  6. Mather T., Kumaraswamy S., Latif S., 2009. Cloud security and privacy: an enterprise perspective on risks and compliance. Book, publisher Sebastopol, CA: O'Reilly.
  7. Pearson, S., 2009. Taking account of privacy when designing cloud computing services. ICSE Workshop on Software Engineering Challenges of Cloud Computing, CLOUD 7809. Vancouver, BC, 23-23 May 2009
Download


Paper Citation


in Harvard Style

Hadar E., Hadar I., Jerbi A., Hadar E. and Hadar I. (2012). SELF-AWARE DEPLOYMENT ENFORCEMENT OF VIRTUALIZED AND CLOUD-BASED IMAGES . In Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8565-05-1, pages 602-605. DOI: 10.5220/0003912906020605


in Bibtex Style

@conference{closer12,
author={Ethan Hadar and Irit Hadar and Amir Jerbi and Ethan Hadar and Irit Hadar},
title={SELF-AWARE DEPLOYMENT ENFORCEMENT OF VIRTUALIZED AND CLOUD-BASED IMAGES},
booktitle={Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2012},
pages={602-605},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003912906020605},
isbn={978-989-8565-05-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - SELF-AWARE DEPLOYMENT ENFORCEMENT OF VIRTUALIZED AND CLOUD-BASED IMAGES
SN - 978-989-8565-05-1
AU - Hadar E.
AU - Hadar I.
AU - Jerbi A.
AU - Hadar E.
AU - Hadar I.
PY - 2012
SP - 602
EP - 605
DO - 10.5220/0003912906020605