Autonomic Resilient Cloud Management (ARCM) Design and Evaluation

作者: Cihan Tunc , Farah Fargo , Youssif Al-Nashif , Salim Hariri , John Hughes

DOI: 10.1109/ICCAC.2014.35

关键词:

摘要: Cloud Computing is emerging as a new paradigm that aims delivering computing utility. For the cloud to be fully adopted and effectively used, it critical security mechanisms are robust resilient faults attacks. Securing systems extremely complex due many interdependent tasks such application layer firewalls, alert monitoring analysis, source code user identity management. It strongly believed we cannot build services immune Resiliency attacks becoming an important approach address cyber-attacks mitigate their impacts. for mission demanded higher. In this paper, present methodology develop Autonomic Resilient Management (ARCM) based on moving target defense, service Behavior Obfuscation (BO), autonomic computing. By continuously randomly changing execution environments platform types, will difficult especially insider attackers figure out current environment existing vulnerabilities, thus allowing system evade We show how apply ARCM one class of applications, Map/Reduce, evaluate its performance overhead.

参考文章(26)
David Evans, Anh Nguyen-Tuong, John Knight, Effectiveness of Moving Target Defenses Moving Target Defense. pp. 29- 48 ,(2011) , 10.1007/978-1-4614-0977-9_2
Wing N. Toy, Fault-Tolerant Computing* Advances in Computers. ,vol. 26, pp. 201- 279 ,(1987) , 10.1016/S0065-2458(08)60008-X
Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier, Matthew Elder, Darrell Kienzle, Angelos Stavrou, The MEERKATS Cloud Security Architecture international conference on distributed computing systems workshops. pp. 446- 450 ,(2012) , 10.1109/ICDCSW.2012.42
Paulo Verissimo, Alysson Bessani, Marcelo Pasin, The TClouds architecture: Open and resilient cloud-of-clouds computing dependable systems and networks. pp. 1- 6 ,(2012) , 10.1109/DSNW.2012.6264686
Gábor Pék, Levente Buttyán, Boldizsár Bencsáth, A survey of security issues in hardware virtualization ACM Computing Surveys. ,vol. 45, pp. 40- ,(2013) , 10.1145/2480741.2480757
Hans Braunschweiler, Security as a Service The Geneva Papers on Risk and Insurance - Issues and Practice. ,vol. 3, pp. 42- 55 ,(1978) , 10.1057/GPP.1978.5
Jun Feng, Yu Chen, Douglas Summerville, Wei-Shinn Ku, Zhou Su, Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol 2011 IEEE Consumer Communications and Networking Conference (CCNC). pp. 521- 522 ,(2011) , 10.1109/CCNC.2011.5766528
Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan, A survey on security issues and solutions at different layers of Cloud computing The Journal of Supercomputing. ,vol. 63, pp. 561- 592 ,(2013) , 10.1007/S11227-012-0831-5
Huangcun Zeng, Research on Developing an Attack and Defense Lab Environment for Cross Site Scripting Education in Higher Vocational Colleges international conference on computational and information sciences. pp. 1971- 1974 ,(2013) , 10.1109/ICCIS.2013.515