Inter-Agent Coordinated Security Model for Cloud Based Virtual Machines

E. C. Onuoha*, O. P. Akomolafe **
* Lecturer, Federal Polytechnic, Bida, Nigeria.
** Lecturer, Department of Computer Science, University of Ibadan, Ibadan, Nigeria.
Periodicity:July - December'2018
DOI : https://doi.org/10.26634/jcc.5.2.15688

Abstract

For a user who desires to utilize the services of the cloud, security is not negotiable. Cloud Service Providers (CSPs) have security features that help protect user's data and information. These features are however not comprehensive. The Service Level Agreement (SLA) of most CSPs have certain exclusions that warrant users to undertake some measures of security upon themselves, especially for tenants having Virtual Machines (VM) in a multi-tenant architecture. This means that users who are ignorant of the security implications might be exposed to great risks. This paper presents a security model that used the OPNET (Optimized Network Engineering Tools) modeler, based on distributed agents, to prevent attacks from rogue virtual machine and enhance security of VM-to-VM communication. A set of mobile devices were given varying levels of access and pitched against some servers. Observing the packet network delays, phase response time for security apps and the coordination between these mobile devices and the installed agents on the servers showed that data belonging to tenants are safer and attacks from virtual machines are almost negligible.

Keywords

Multi-Agent, Distributed Agent, Virtual Machine, Service Level Agreement.

How to Cite this Article?

Onuoha,E.C., Akomolafe,O.P.(2018).Inter-Agent Coordinated Security Model for Cloud Based Virtual Machines, i-manager's Journal on Cloud Computing 5(2), 11-19. https://doi.org/10.26634/jcc.5.2.15688

References

[1]. Al Aqrabi, H., Liu, L., Hill, R., & Antonopoulos, N. (2014, August). A multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service. In High Performance Computing and Communications, 2014 IEEE 6th Intl. Symp. on Cyberspace Safety and Security, 2014 IEEE 11th Intl. Conf. on Embedded Software and Syst. (HPCC, CSS, ICESS), 2014 IEEE Intl. Conf. on (pp. 498-505). IEEE.
[2]. Amazon S3 Service Level Agreement. (2018). Amazon Simple Storage Service. Retrieved from https://aws.amazon.com/s3/sla/
[3]. Che, J., Duan, Y., Zhang, T., & Fan, J. (2011). Study on the security models and strategies of cloud computing. Procedia Engineering, 23, 586-593.
[4]. Colbert, B., & Batten, L. M. (2011, January). Dealing with rogue virtual machines in a cloud services environment. In CLOSER 2011: Proceedings of the 1st International Conference on Cloud Computing and Services Science (pp. 43-48). INSTICC.
[5]. Felici, M., & Fernández-Gago, C. (Eds.). (2015). Accountability and Security in the Cloud: First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures (Vol. 8937). Springer.
[6]. Gaggero, M., & Caviglione, L. (2016, July). Model predictive control for the placement of Virtual Machines in cloud computing applications. In American Control Conference (ACC), 2016 (pp. 1987-1992). IEEE.
[7]. Google Compute Engine Service Level Agreement. (2018). Google cloud. Retrieved from https://cloud. google.com/compute/sla
[8]. Khalil, I. M., Khreishah, A., & Azeem, M. (2014). Cloud computing security: A survey. Computers, 3(1), 1-35.
[9]. Kumar, V. K. A., Kumar, R., N., Kumar, K. K., & Kumar, S. N. K. (2014). Survey on security threats in cloud computing. International Journal of Applied Engineering Research (IJAER), 9(21), 10495-10500.
[10]. Perez-Botero, D., Szefer, J., & Lee, R. B. (2013, May). Characterizing hypervisor vulnerabilities in cloud computing servers. In Proceedings of the 2013 international workshop on Security in cloud computing (pp. 3-10). ACM.
[11]. SLA for Storage. (2015). Service Level Agreement. Retrieved from https://azure.microsoft.com/ en-in/ support/legal/sla/storage/v1_0/
[12]. Smith, J. E., & Nair, R. (2005a). The architecture of Virtual Machines. Computer, 38(5), 32-38.
[13]. Smith, J., & Nair, R. (2005b). Virtual Machines: Versatile Platforms for Systems and Processes. Elsevier.
[14]. Zhao, L., Sakr, S., Liu, A., & Bouguettaya, A. (2014). Cloud Data Management. Springer.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.