+44 (0)1509 263171
Please use this identifier to cite or link to this item:
|Title: ||Infrastructure as a service: Exploring network access control challenges|
|Authors: ||Al-Amri, Shadha Mohamed|
Live virtual machine migration
|Issue Date: ||2016|
|Publisher: ||© IEEE|
|Citation: ||AL-AMRI, S. and GUAN, L., 2016. Infrastructure as a service: Exploring network access control challenges. Presented at the SAI Computing Conference (SAI 2016), London, UK, 13-15th July, pp. 596-603.|
|Abstract: ||Cloud Computing Infrastructure as a Service (IaaS) is a great model for outsourcing IT infrastructure. It is built to offer fascinating features to support business development, such as elasticity, multi-tenancy, configurability and dynamicity.
However, IaaS faces security challenges on account of its flexible nature. For this article, we studied the IaaS characteristics and investigated their related security challenges. We then elaborated these security challenges by exploring the security threats on live virtual machine migration as it is one of the main IaaS operations. We found that proper access control techniques and models are a critical element in enhancing IaaS and mitigating the identified security threats. Therefore, we investigated and contrasted the implemented and the proposed firewall architectures in IaaS as a firewall is a basic security appliance that enforces access control.
We also explored and contrasted the proposed access control models in the IaaS. It was found that the traditional firewalls and access control models were not sufficient for IaaS. Therefore, there is a need to develop a proper access control model and
enforcement techniques to mitigate IaaS security threats. Based on the security research trend and the results obtained in this articles exploration, we endorse an IaaS access control system built on a computational intelligent approach.|
|Description: ||© IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.|
|Version: ||Accepted for publication|
|Publisher Link: ||https://doi.org/10.1109/SAI.2016.7556042|
|Appears in Collections:||Conference Papers and Presentations (Computer Science)|
Files associated with this item:
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.