Figure 6 - uploaded by Ahmed Alenezi
Content may be subject to copyright.
Initial Framework for Securing the Shared VM Image 

Initial Framework for Securing the Shared VM Image 

Context in source publication

Context 1
... this case, access control and authorization are related to each other so that access control is replaced with authorization [29]. As a result, an initial framework (Conceptual) of 13 security controls is proposed as shown in Figure 6. The security controls are described below. ...

Citations

... A security framework that tried to protect the Virtual Machine Images (VMI) in a cloud platform was devised by Hussein, Alenezi, Wills and Walters in (Hussein et al., 2016). The paper formulated a research path following which VMI security could be strengthened. ...
... A security framework that tried to protect the Virtual Machine Images (VMI) in a cloud platform was devised by Hussein, Alenezi, Wills and Walters in (Hussein et al., 2016). The paper formulated a research path following which VMI security could be strengthened. ...
... The VMI may include operating system like windows, Linux or Fedora and might contains other resources like applications that are created by organization such as database management system or application server [1]. There are some security issues associated with VMI in cloud computing that has harmful impact on the security of the cloud and might affect confidentiality, integrity or availability [2]. Threat modelling is conducted to identify security threats and draw possible routes threats might follow to attack the VMI. ...
... • dynamically provides infrastructure, platform, and software resources from any location of world over the internet in a pay-as-you-go basis; • offers an innovative business model for organizations to adopt IT without upfront investment (Behl and Behl 2012); • increases efficiency, reduces cost and time-to-market, and provides on-demand access to a shared pool of resources and services, provided with minimum management effort (Hussein et al. 2016); • offers ready-to-consume IT services that can reduce the IT overhead for starting a new business, enhance business agility, and reduce costs (Alkhalil et al. 2016). ...
Article
Full-text available
Collaborative networked organizations (CNOs) have been proposed as a response to the characteristics of highly competitive global business environments. So far, many projects have been funded to establish CNOs, however, most of these efforts have been done with traditional strategies. To move from the traditional methods of creating and operating inter-organizational collaborations towards Cloud-based solutions, we first adapt the Scrum methodology to being usable with specific characteristics of Cloud-oriented collaborations. In the following, we present a reference architecture for a system deployed on a Cloud provider offering the Creation phase of CNOs life cycle as a service. The goal is to show that Cloud is a potentially reliable, scalable, and cost-effective IT solution for exploitation of external knowledge resources, skills, and production facilities in CNO domain, where using traditional solutions were more challenging.
... Surfers of the Web can easily earmark online storage space, which they can then use to safely store their data; indeed, they can also gain access to IT resources which they can employ to manage and sort their information according to their requirements. This paper builds on work which was originally presented at the IEEE International Conference on Smart Cloud 2016 [1]. ...
... Previous studies have put forth a security framework which can be used to protect the Virtual Machine (VM) image in cloud computing [1]. The present paper details exactly how the conceptual framework has been confirmed through interviews with experts in the field of cloud security. ...
... This section describes the research methodology which was used to confirm the framework and identify additional requirements which are necessary in order to secure cloud computing VM images, as shown in [1]. The initial framework, shown in Figure 2, was derived from the literature review. ...
Article
Full-text available
The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction of cloud computing is virtualisation. While this concept brings its own security risks, these risks are not necessarily related to the cloud. The main disadvantage of using cloud computing is linked to safety and security. This is because anybody which chooses to employ cloud computing will use someone else's hard disk and CPU in order to sort and store data. In cloud environments, a great deal of importance is placed on guaranteeing that the virtual machine image is safe and secure. Indeed, a previous study has put forth a framework with which to protect the virtual machine image in cloud computing. As such, the present study is primarily concerned with confirming this theoretical framework so as to ultimately secure the virtual machine image in cloud computing. This will be achieved by carrying out interviews with experts in the field of cloud security.
... Surfers of the Web can easily earmark online storage space, which they can then use to safely store their data; indeed, they can also gain access to IT resources which they can employ to manage and sort their information according to their requirements. This paper builds on work which was originally presented at the IEEE International Conference on Smart Cloud 2016 [1]. ...
... Previous studies have put forth a security framework which can be used to protect the Virtual Machine (VM) image in cloud computing [1]. The present paper details exactly how the conceptual framework has been confirmed through interviews with experts in the field of cloud security. ...
... This section describes the research methodology which was used to confirm the framework and identify additional requirements which are necessary in order to secure cloud computing VM images, as shown in [1]. The initial framework, shown in Figure 2, was derived from the literature review. ...
Article
Full-text available
The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction of cloud computing is virtualisation. While this concept brings its own security risks, these risks are not necessarily related to the cloud. The main disadvantage of using cloud computing is linked to safety and security. This is because anybody which chooses to employ cloud computing will use someone else's hard disk and CPU in order to sort and store data. In cloud environments, a great deal of importance is placed on guaranteeing that the virtual machine image is safe and secure. Indeed, a previous study has put forth a framework with which to protect the virtual machine image in cloud computing. As such, the present study is primarily concerned with confirming this theoretical framework so as to ultimately secure the virtual machine image in cloud computing. This will be achieved by carrying out interviews with experts in the field of cloud security.
Article
Full-text available
Virtual Machine Image (VMI) is the building block of cloud infrastructure. It encapsulates the various applications and data deployed at the Cloud Service Provider (CSP) end. With the leading advances of cloud computing, comes the added concern of its security. Securing the Cloud infrastructure as a whole is based on the security of the underlying Virtual Machine Images (VMI). In this paper an attempt has been made to highlight the various risks faced by the CSP and Cloud Service Consumer (CSC) in the context of VMI related operations. Later, in this article a formal model of the cloud infrastructure has been proposed. Finally, the Ethereum blockchain has been incorporated to secure, track and manage all the vital operations of the VMIs. The immutable and decentralized nature of blockchain not only makes the proposed scheme more reliable but guarantees auditability of the system by maintaining the entire VMI history in the blockchain.