Research Article
Toward Agent Based Inter-VM Traffic Authentication in a Cloud Environment
@INPROCEEDINGS{10.1007/978-3-319-11569-6_42, author={Benzidane Karim and Saad Khoudali and Abderrahim Sekkaki}, title={Toward Agent Based Inter-VM Traffic Authentication in a Cloud Environment}, proceedings={Mobile and Ubiquitous Systems: Computing, Networking, and Services. 10th International Conference, MOBIQUITOUS 2013, Tokyo, Japan, December 2-4, 2013, Revised Selected Papers}, proceedings_a={MOBIQUITOUS}, year={2014}, month={12}, keywords={Ubiquitous computing Cloud computing Virtualization Security Intrusion detection}, doi={10.1007/978-3-319-11569-6_42} }
- Benzidane Karim
Saad Khoudali
Abderrahim Sekkaki
Year: 2014
Toward Agent Based Inter-VM Traffic Authentication in a Cloud Environment
MOBIQUITOUS
Springer
DOI: 10.1007/978-3-319-11569-6_42
Abstract
Ubiquitous simply means being everywhere. The concept of Cloud Computing (CC) further strengthens the idea of Ubiquitous computing. On the other hand, one of the key enablers of CC is Virtualization. However, with the many advantages of virtualization comes certain limitations, especially related to security. Virtualization vulnerabilities and more specifically isolation, creates new targets for intrusion due to the complexity of access and difficulty in monitoring all interconnection points between systems, applications, and data sets. Hence, without strict control put in place within the Cloud, guests could violate and bypass security policies, intercept unauthorized client data, and initiate or become the target of security attacks. This article discusses the security and the visibility issues of inter-VM traffic, by proposing a solution for it within the Cloud context. The proposed approach provides Virtual Machines (VMs) authentication, communication integrity, and enforces trusted transactions, through security mechanisms, structures, policies, and various intrusion detection techniques.