A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud Computing

  • Zakaria Elmrabet
  • Hamid ElghaziEmail author
  • Tayeb Sadiki
  • Hassan Elghazi
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 366)


Cloud computing is a new model of computing which provides scalability, flexibility and on-demand service. Virtualization is one of the main components of the cloud, but unfortunately this technology suffers from many security vulnerabilities. The main purpose of this paper is to present a new secure architecture of Virtual Network machines in order to increase security among virtual machines in a virtualized environment (Xen as a case study). First, we expose the different network modes based on Xen Hypervisor, and then we analyses vulnerabilities and security issues within these kind of environment. Finally, we present in details new secure architecture and demonstrate how it can face the main security network attacks.


Cloud computing Virtualization Virtual network security Xen hypervisor Spoofing Sniffing Mac flooding 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Chirag, M., Patel, D., et al.: A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing 63(2), 561–592 (2013). SpringerCrossRefGoogle Scholar
  2. 2.
    Salah, K., et al.: Using Cloud Computing to Implement a Security Overlay Network. Security & Privacy 11(1), 44–53 (2013). IEEEGoogle Scholar
  3. 3.
    Vangie, B.: (website visited April 2015).
  4. 4.
    National vulnerability database version 2.2.NIST (website visited mars 2015).
  5. 5.
    Mariam, K.: A Methodology for Cloud Security Risks Management. Cloud Computing: Challenges, Limitations and R&D Solutions, 75–104 (2014). SpringerGoogle Scholar
  6. 6.
    Grover, J., Shikha, Sharma, M.: Cloud computing and its security issues — a review. In: 2014 International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–5. IEEE (2014)Google Scholar
  7. 7.
    Bruschi, D., Ornaghi, A., Rosti, E.: S-ARP: a secure address resolution protocol. In: Proceedings of the 19th Annual Computer Security Applications Conference, 2003, pp. 66–74. IEEE (2003)Google Scholar
  8. 8.
    Chin, T.S., Singh, Y.P.: Single-hop wavelength assignment using an ant algorithm in WDM MESH network. WSEAS Transactions on Computers 5(7), 294–300 (2006)Google Scholar
  9. 9.
    Zheng, W., Li, C.: An Algorithm Against Attacks Based on ARP Spoofing. Journal of Southern Yangtze University (Natural Science Edition) 2(6), 167–1696 (2003)Google Scholar
  10. 10.
    Tian, Z.H., Fang, B.X., Li, B., et al.: Avulnerability-driven approach to active alert verification for accurate and efficient intrusion detection. WSEAS Transactions on Communications 4(10), 1002–1009 (2005)Google Scholar
  11. 11.
    Chaganti, P.: Xen Virtualization, p. 74 (2007)Google Scholar
  12. 12.
    Wu, H., et al.: Network security for virtual machine in cloud computing. In: 2010 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 18–21. IEEE (2010)Google Scholar
  13. 13.
    CERT Training and Education, Carnegie Mellon University (2009).
  14. 14.
    Hayriye, A., Sven, K., Henry, L., et al.: Securing layer 2 in local area networks. In: Networking - ICN 2005, 4th International Conference on Networking, Reunion Island, France, Proceedings, Part II, pp. 699–706. Springer (2005)Google Scholar
  15. 15.
  16. 16.
    Open vswitch. (website visited April 2015)
  17. 17.
  18. 18.
    Vmweare Virtual Networking Concept (2007).
  19. 19.
  20. 20.
    Justin, P., et al.: Virtual Switching in an Era of Advanced Edges. (website visited July 2015)

Copyright information

© Springer Science+Business Media Singapore 2016

Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (, which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Authors and Affiliations

  • Zakaria Elmrabet
    • 1
  • Hamid Elghazi
    • 2
    Email author
  • Tayeb Sadiki
    • 2
  • Hassan Elghazi
    • 1
  1. 1.National Institute of Posts and TelecommunicationsRabatMorocco
  2. 2.International University of RabatRabatMorocco

Personalised recommendations