Abstract
Cloud computing is a new model of computing which provides scalability, flexibility and on-demand service. Virtualization is one of the main components of the cloud, but unfortunately this technology suffers from many security vulnerabilities. The main purpose of this paper is to present a new secure architecture of Virtual Network machines in order to increase security among virtual machines in a virtualized environment (Xen as a case study). First, we expose the different network modes based on Xen Hypervisor, and then we analyses vulnerabilities and security issues within these kind of environment. Finally, we present in details new secure architecture and demonstrate how it can face the main security network attacks.
Keywords
This is a preview of subscription content, log in via an institution.
Preview
Unable to display preview. Download preview PDF.
References
Chirag, M., Patel, D., et al.: A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing 63(2), 561–592 (2013). Springer
Salah, K., et al.: Using Cloud Computing to Implement a Security Overlay Network. Security & Privacy 11(1), 44–53 (2013). IEEE
Vangie, B.: (website visited April 2015). http://www.webopedia.com/TERM/V/virtualization.html
National vulnerability database version 2.2.NIST (website visited mars 2015). http://web.nvd.nist.gov/view/vuln/searchresults?query=virtual&search%_type=all&cves=on
Mariam, K.: A Methodology for Cloud Security Risks Management. Cloud Computing: Challenges, Limitations and R&D Solutions, 75–104 (2014). Springer
Grover, J., Shikha, Sharma, M.: Cloud computing and its security issues — a review. In: 2014 International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–5. IEEE (2014)
Bruschi, D., Ornaghi, A., Rosti, E.: S-ARP: a secure address resolution protocol. In: Proceedings of the 19th Annual Computer Security Applications Conference, 2003, pp. 66–74. IEEE (2003)
Chin, T.S., Singh, Y.P.: Single-hop wavelength assignment using an ant algorithm in WDM MESH network. WSEAS Transactions on Computers 5(7), 294–300 (2006)
Zheng, W., Li, C.: An Algorithm Against Attacks Based on ARP Spoofing. Journal of Southern Yangtze University (Natural Science Edition) 2(6), 167–1696 (2003)
Tian, Z.H., Fang, B.X., Li, B., et al.: Avulnerability-driven approach to active alert verification for accurate and efficient intrusion detection. WSEAS Transactions on Communications 4(10), 1002–1009 (2005)
Chaganti, P.: Xen Virtualization, p. 74 (2007)
Wu, H., et al.: Network security for virtual machine in cloud computing. In: 2010 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 18–21. IEEE (2010)
CERT Training and Education, Carnegie Mellon University (2009). http://science.hamptonu.edu/compsci/docs/iac/packet_sniffing.pdf
Hayriye, A., Sven, K., Henry, L., et al.: Securing layer 2 in local area networks. In: Networking - ICN 2005, 4th International Conference on Networking, Reunion Island, France, Proceedings, Part II, pp. 699–706. Springer (2005)
http://www.netsecurity.org/software.php?id=4 (website visited March 2015)
Open vswitch. http://openvswitch.org/ (website visited April 2015)
http://www.omnisecu.com/cisco-certified-network-associate-ccna/advantages-of-vlan.php (website visited April 2015)
Vmweare Virtual Networking Concept (2007). http://www.vmware.com/files/pdf/virtual_networking_concepts.pdf
Vlan configuration. http://openvswitch.org/support/config-cookbooks/vlan-configuration-cookbook/ (website visited April 2015)
Justin, P., et al.: Virtual Switching in an Era of Advanced Edges. http://benpfaff.org/papers/adv-edge.pdf (website visited July 2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Elmrabet, Z., Elghazi, H., Sadiki, T., Elghazi, H. (2016). A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud Computing. In: Sabir, E., Medromi, H., Sadik, M. (eds) Advances in Ubiquitous Networking. UNet 2015. Lecture Notes in Electrical Engineering, vol 366. Springer, Singapore. https://doi.org/10.1007/978-981-287-990-5_9
Download citation
DOI: https://doi.org/10.1007/978-981-287-990-5_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-287-989-9
Online ISBN: 978-981-287-990-5
eBook Packages: EngineeringEngineering (R0)