Project

A Framework to secure the shared Virtual machine Image in cloud computing

Goal: There is a number of security and privacy issues at different layer in cloud computing architecture. Among the security issues, the ones in virtualization layer need to be considered. Virtualization is a significant component for cloud as it helps the cloud to deliver its services. The virtual machine(VM) image sharing is the most significant and it might affect the security of the cloud as it is the template used to initialize a new VM as shown in figure1.The aim of this study is to secure the shared VM image in cloud computing.

Updates
0 new
0
Recommendations
0 new
0
Followers
0 new
13
Reads
0 new
159

Project log

Raid Hussein
added a research item
The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction of cloud computing is virtualisation. While this concept brings its own security risks, these risks are not necessarily related to the cloud. The main disadvantage of using cloud computing is linked to safety and security. This is because anybody which chooses to employ cloud computing will use someone else's hard disk and CPU in order to sort and store data. In cloud environments, a great deal of importance is placed on guaranteeing that the virtual machine image is safe and secure. Indeed, a previous study has put forth a framework with which to protect the virtual machine image in cloud computing. As such, the present study is primarily concerned with confirming this theoretical framework so as to ultimately secure the virtual machine image in cloud computing. This will be achieved by carrying out interviews with experts in the field of cloud security.
Raid Hussein
added 2 research items
In the last few years, the cloud computing paradigm experienced a considerable growth, making it the de-facto technology fuelling almost all major online services. At the same time, the concept of Internet of Things has started to gain mainstream traction with the promise to usher a new era of pervasive sensing using a weave of numerous inter-connected IoT devices. Such IoT devices can generate an enourmous amount of data which becomes increasingly difficult to process using the limited computational and storage capabilities of these devices. To tackle this problem, a notion of a novel technology called Cloud of Things is emerging.. However, to harness the full potential of this new paradigm, different security and privacy issues need to be properly analysed. The first step for carrying out such an analysis is to define a well-constructed threat model. In this chapter, we present a comprehensive threat model which is then utilised to create a first-ever threat taxonomy for Cloud of Things. This taxonomy outlines different security and privacy threats faced by this nascent technology and can be used as the basis for further research on security and privacy in Cloud of Things.
Raid Hussein
added a project goal
There is a number of security and privacy issues at different layer in cloud computing architecture. Among the security issues, the ones in virtualization layer need to be considered. Virtualization is a significant component for cloud as it helps the cloud to deliver its services. The virtual machine(VM) image sharing is the most significant and it might affect the security of the cloud as it is the template used to initialize a new VM as shown in figure1.The aim of this study is to secure the shared VM image in cloud computing.