Achieving Security in the Cloud Infrastructure

Topics: Access control, Authentication, Cloud computing Pages: 1 (290 words) Published: September 20, 2010
Achieving security in the cloud infrastructure
Titlle-Security for the cloud infrastructure & Trusted virtual data center implementation Cloud computing is a term that describes the development of many existing technologies and approaches to computing into something different. “Clouds are a large pool of easily usable and accessible virtualized resources ( hardware, development platforms and/or services). Cloud service delivery is divided among three models. “SPI Model,”where ‘SPI’ refers to Software, Platform or Infrastructure (as a Service),. The trusted virtual data center (TVDc) is a technology developed to address the need for strong isolation and integrity guarantees in virtualized environments. TVDc by implementing controlled access to networked storage based on security labels and by implementing management prototypes that demonstrate the enforcement of isolation constraints and integrity checking. For intrusion detection in cloud computing the solution consists of two kinds of analysis behavioral and knowledge analysis. In behavioral analysis, data mining techniques were used and in knowledge analysis security policy violations and attack patterns were analyzed to detect or prevent intrusion. There are different authentication mechanisms for different services. The most commonly used mechanisms are Open Id, Open Auth, and User Request Token. The organizations using cloud computing should maintain their own data backups to continuous access to their data even at the extreme situations such as disaster at data center etc ( M. and S. Pearson (2009) has proposed client based privacy manager to eliminate the fear of data leakage and loss of privacy in cloud computing. Benefit is that communication between the cloud and local machine is encrypted so that man in middle cannot intercept the traffic. This would be a huge cost saving for the company. Keywords-Cloud Computing,virtulized,prototypes,integrity checking,intrusion detection,database backups,request...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Security and privacy challenges in cloud computing Essay
  • Cloud Computing Security Project Essay
  • Private Virtual Infrastructure Cloud Computing Essay
  • Infrastructure Security Research Paper
  • Infrastructure and Security Essay
  • Cloud Computing and Security Challenges Essay
  • Security Issues in Cloud Computing Essay
  • Cloud Security Report Essay

Become a StudyMode Member

Sign Up - It's Free