A Novel Virtualization Enabled Cloud Infrastructural Framework for Enhancing Private Cloud Communication Security

A Novel Virtualization Enabled Cloud Infrastructural Framework for Enhancing Private Cloud Communication Security

To implement security in cloud platform the significance of virtualization can’t be neglected. The hypervisors, which is also known as virtual machine monitor, offer a handful of facilities to configure the virtual machines to redesign the communication channel through which they can interact with each other or with the internet. We have studied how the facilities of virtualization can be optimally used to secure the communication between virtual machines and internet in a private cloud infrastructure. In this regard, we have tried to enhance the communication mechanism through constructing a cloud infrastructure framework. This paper deals with the isolation of virtual instances to improve the private cloud security through prevention from spreading infections between virtual machines VMs & also between VM & internet. Moreover, our proposal focuses on the filtering of inflow and outflow traffic to and from the outside world through a dedicated VM of a host implemented in layered switching environment.

___

  • Y. Xiaowei, Z. Xiaosong, C. Ting, Z. Hongtian, and L. Xiaoshan, The Research and Design of Cloud Computing Security Framework, Springer-Verlag Berlin Heidelberg, vol. 121, pp. 757-763, 2011.
  • S. Sthapak, K. Garg and R. Shah, Enhanced Security in Cloud Computing: From Single to MultiClouds, IJERT, vol. 3, issue 2, pp. 2244-2248, February 2014.
  • Z. Ahmad, A. M. Zeki and A Olowo, Risks with Cloud Computing Data Residency and Virtualization, Journal of Software Engineering and Intelligent System, vol. 1, issue 1, pp. 24-28, 31st August 2016.
  • H. Wu, Y. Ding and C. Winer, Network Security for Virtual Machine in Cloud Computing, 5th Interna- tional Conference on Computer Sciences and Conver- gence Information Technology, vol. 1, pp. 18-21, 2010, doi:10.1109/iccit.2010.5711022.
  • A. Gangwani, H. Shah and K. Shah, A Survey on Differ- ent Cloud Computing Security and Migration Techniques, IJRAR, vol. 7, issue 1, pp. 959-963, March 2020.
  • P. Sharma and V. Jha, Boosting Security for Cloud Storage, IJRASET, vol. 8, issue V, pp. 2725-2730, May 2020, doi:10.22214/ijraset.2020.5458.
  • K. Gupta and A. Kush, A Review on Data Leakage Detection for Secure Communication, IJEAT, vol. 7, issue 1, pp. 153-159, October 2017.
  • A. Riaz, H. F. Ahmad, A. K. Kiani, J. Qadir, R. U. Rasool and U. Younis, Intrusion Detection Systems in Cloud Computing: A Contemporary Review of Techniques and Solutions, Journal of Information Science and Engineering, vol. 33, pp. 611-634, 2017.
  • N. R. Tadapaneni, Cloud Computing Security Challenges, International Journal of Innovations in Engineering Re- search and Technology (IJIERT), vol. 7, issue 6, pp. 1-5, June 2020.
  • M. S. Taj, S. I. Ullah, A. Salam and W. U. Khan, Enhancing Anomaly Based Intrusion Detection Techniques for Virtualization in Cloud Computing Using Machine Learning, International Journal of Computer Science and Information Security (IJCSIS), vol. 18, no. 5, pp. 68-78, May 2020.
  • N. Chandrakala and B. Thirumala Rao, Migration of Virtual Machine to improve the Security in Cloud Com- puting, International Journal of Electrical and Computer Engineering, ISSN: 2088-8708, vol. 8, no. 1, pp. 210-219, February 2018.
  • R. Velumadhava Rao and K. Selvamani, Data Security Challenges and Its Solutions in Cloud Computing, Inter- national Conference on Intelligent Computing, Communi- cation & Convergence, vol. 48, pp. 204-209, 2015.
  • S. Mall and S. K. Saroj, A New Security Framework for Cloud Data,8th International Conference on Advances in Computing and Communication, vol. 143, pp. 765-775, 2018.
  • A. P. Singh and S. K. Pasupuleti, Optimized Public Audit- ing and Data Dynamics for Data Storage Security in Cloud Computing,6th International Conference on Advances in Computing & Communications, vol. 93, pp. 751-759, 6-8 September 2016, Cochin, India.