Mobile and Ubiquitous Systems: Computing, Networking, and Services. 10th International Conference, MOBIQUITOUS 2013, Tokyo, Japan, December 2-4, 2013, Revised Selected Papers

Research Article

Toward Agent Based Inter-VM Traffic Authentication in a Cloud Environment

Download
510 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-11569-6_42,
        author={Benzidane Karim and Saad Khoudali and Abderrahim Sekkaki},
        title={Toward Agent Based Inter-VM Traffic Authentication in a Cloud Environment},
        proceedings={Mobile and Ubiquitous Systems: Computing, Networking, and Services. 10th International Conference, MOBIQUITOUS 2013, Tokyo, Japan, December 2-4, 2013,  Revised Selected Papers},
        proceedings_a={MOBIQUITOUS},
        year={2014},
        month={12},
        keywords={Ubiquitous computing Cloud computing Virtualization Security Intrusion detection},
        doi={10.1007/978-3-319-11569-6_42}
    }
    
  • Benzidane Karim
    Saad Khoudali
    Abderrahim Sekkaki
    Year: 2014
    Toward Agent Based Inter-VM Traffic Authentication in a Cloud Environment
    MOBIQUITOUS
    Springer
    DOI: 10.1007/978-3-319-11569-6_42
Benzidane Karim1,*, Saad Khoudali1,*, Abderrahim Sekkaki1,*
  • 1: University Hassan II
*Contact email: k.benzidane@live.fr, s.khoudali@yahoo.fr, a_sekkaki@yahoo.fr

Abstract

Ubiquitous simply means being everywhere. The concept of Cloud Computing (CC) further strengthens the idea of Ubiquitous computing. On the other hand, one of the key enablers of CC is Virtualization. However, with the many advantages of virtualization comes certain limitations, especially related to security. Virtualization vulnerabilities and more specifically isolation, creates new targets for intrusion due to the complexity of access and difficulty in monitoring all interconnection points between systems, applications, and data sets. Hence, without strict control put in place within the Cloud, guests could violate and bypass security policies, intercept unauthorized client data, and initiate or become the target of security attacks. This article discusses the security and the visibility issues of inter-VM traffic, by proposing a solution for it within the Cloud context. The proposed approach provides Virtual Machines (VMs) authentication, communication integrity, and enforces trusted transactions, through security mechanisms, structures, policies, and various intrusion detection techniques.