CFP last date
20 December 2024
Reseach Article

A Survey on Infrastructure as Service Layer based Security Models for Cloud

by Shalinee Jadon, Sanjay Silakari, Uday Chourasia
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 142 - Number 13
Year of Publication: 2016
Authors: Shalinee Jadon, Sanjay Silakari, Uday Chourasia
10.5120/ijca2016909984

Shalinee Jadon, Sanjay Silakari, Uday Chourasia . A Survey on Infrastructure as Service Layer based Security Models for Cloud. International Journal of Computer Applications. 142, 13 ( May 2016), 28-30. DOI=10.5120/ijca2016909984

@article{ 10.5120/ijca2016909984,
author = { Shalinee Jadon, Sanjay Silakari, Uday Chourasia },
title = { A Survey on Infrastructure as Service Layer based Security Models for Cloud },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 142 },
number = { 13 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 28-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume142/number13/24960-2016909984/ },
doi = { 10.5120/ijca2016909984 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:45:00.186620+05:30
%A Shalinee Jadon
%A Sanjay Silakari
%A Uday Chourasia
%T A Survey on Infrastructure as Service Layer based Security Models for Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 142
%N 13
%P 28-30
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud security is been a center of attraction of all the researchers in the recent years. In this paper a survey is done on cloud security issues which are focused on Infrastructure as a Service (IaaS) layer. The virtualization in cloud is provided by infrastructure as a service layer and in this paper security issues related to virtualization is discussed.

References
  1. C. C. Basics, “Cloud Computing basics for non-experts”, cloud weeks, pp. 1–8, May, 2015.
  2. Huth and J. Cebula, “The Basics of Cloud Computing”, Carnegie Mellon University, Pp.1–4, February, 2011.
  3. M. Armbrust, A. D. Joseph, R. H. Katz and D. A. Patterson, “Above the Clouds: A Berkeley View of Cloud Computing,” University of California at Berkeley pp. 14-19, February, 2009.
  4. T. Cloud and C. Stack, “The Cloud Computing Stack” Diversity Limited, pp. 1-9, October, 2013.
  5. URL:“http://www.thoughtsoncloud.com/2014/03/a-brief-history-of-cloud-computing”, [last visited : May 30, 2015, 10:01:22 AM]
  6. URL: “https://www.salesforce.com/blog/2014/03/things-from-1999.html”,[last visited: ‎June ‎09, ‎2015, ‏‎2:06:47 AM].
  7. S. Home, “Rackspace Support Network Understanding the Cloud Computing Stack ”, Rackspace Support network, pp. 1–9, May, 2015.
  8. M. Sutton, “the Attacker within How Hackers Are Targeting Enterprise Networks from the Inside-Out”, the Ohio State University, pp.1-9, November, 2009.
  9. Xiaofeng Chen, Jin Li, Willy Susilo, “Efficient Fair Conditional Payments for Outsourcing Computations, Transactions on Information Forensics and Security”, IEEE, pp.1687-1694, March,2012.
  10. B. J. Brodkin, N. W. Cloud, S. Risks, C. Computing and G. A. Engine, “Gartner: Seven cloud-computing security risks,” pp. 2–3, October, 2008.
  11. M. Armbrust, A. D. Joseph, R. H. Katz and D. A. Patterson, “Above the Clouds: A Berkeley View of Cloud Computing”, University of California at Berkeley pp. 14-19, February 10, 2009.
  12. A. Shieh, S. Kandula, A. Greenberg and C. Kim, “Seawall: performance isolation for Cloud datacenter networks”, in Proceedings of the 2nd USENIX conference on Hot topics in Cloud Computing, pp. 33-45,may,2010.
  13. S. Agarwal, J. Dunagan, N. Jain, S. Saroiu, A. Wolman and H. Bhogan, “Volley: Automated data placement for geo-distributed Cloud services,” in Proceedings of the 7th USENIX conference on Networked systems design and implementation, pp.155-170, April, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud VM isolation VM migration VM escape VM image sharing RSA.