Loughborough University
Leicestershire, UK
LE11 3TU
+44 (0)1509 263171
Loughborough University

Loughborough University Institutional Repository

Please use this identifier to cite or link to this item: https://dspace.lboro.ac.uk/2134/23732

Title: Infrastructure as a service: Exploring network access control challenges
Authors: Al-Amri, Shadha Mohamed
Guan, Lin
Keywords: IaaS
Live virtual machine migration
Access control
Firewall
Security
Issue Date: 2016
Publisher: © IEEE
Citation: AL-AMRI, S. and GUAN, L., 2016. Infrastructure as a service: Exploring network access control challenges. Presented at the SAI Computing Conference (SAI 2016), London, UK, 13-15th July, pp. 596-603.
Abstract: Cloud Computing Infrastructure as a Service (IaaS) is a great model for outsourcing IT infrastructure. It is built to offer fascinating features to support business development, such as elasticity, multi-tenancy, configurability and dynamicity. However, IaaS faces security challenges on account of its flexible nature. For this article, we studied the IaaS characteristics and investigated their related security challenges. We then elaborated these security challenges by exploring the security threats on live virtual machine migration as it is one of the main IaaS operations. We found that proper access control techniques and models are a critical element in enhancing IaaS and mitigating the identified security threats. Therefore, we investigated and contrasted the implemented and the proposed firewall architectures in IaaS as a firewall is a basic security appliance that enforces access control. We also explored and contrasted the proposed access control models in the IaaS. It was found that the traditional firewalls and access control models were not sufficient for IaaS. Therefore, there is a need to develop a proper access control model and enforcement techniques to mitigate IaaS security threats. Based on the security research trend and the results obtained in this articles exploration, we endorse an IaaS access control system built on a computational intelligent approach.
Description: © IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Version: Accepted for publication
DOI: 10.1109/SAI.2016.7556042
URI: https://dspace.lboro.ac.uk/2134/23732
Publisher Link: https://doi.org/10.1109/SAI.2016.7556042
ISBN: 9781467384605
Appears in Collections:Conference Papers and Presentations (Computer Science)

Files associated with this item:

File Description SizeFormat
SAI_paper_final_draft.pdfAccepted version232.96 kBAdobe PDFView/Open

 

SFX Query

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.