Securing Cloud Virtual Machine Image using Ethereum Blockchain

2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Virtual Machine Image (VMI) is the building block of cloud infrastructure. It encapsulates the various applications and data deployed at the Cloud Service Provider (CSP) end. With the leading advances of cloud computing, comes the added concern of its security. Securing the Cloud infrastructure as a whole is based on the security of the underlying Virtual Machine Images (VMI). In this paper an attempt has been made to highlight the various risks faced by the CSP and Cloud Service Consumer (CSC) in the context of VMI related operations. Later, in this article a formal model of the cloud infrastructure has been proposed. Finally, the Ethereum blockchain has been incorporated to secure, track and manage all the vital operations of the VMIs. The immutable and decentralized nature of blockchain not only makes the proposed scheme more reliable but guarantees auditability of the system by maintaining the entire VMI history in the blockchain.

Author(s):  
Trinathbasu Miriyala ◽  
JKR Sastry

<p><span lang="EN-US">Cloud computing technologies are being used by many who need computing resources such as software, platform and infrastructure as per their business requirements in terms of provisioning and pay for the usage as per actual consumption of the services based on the SLA signed by the user and cloud service provider. Software running on a physical machine is being provided as services to the end users. For the reasons of cost economies access to software that uses a database is being provided to multiple users. The access to the software is provided either directly or through a virtual machine. The software being provided as service uses the same database for many of the users who have requisitioned for the same. As a result, there could be encroachments by the users into the data of others. There is a need to secure the data belonging to several users while all of them access the data using the same application. In this paper an efficient method is presented for securing the data processed by software which is offered as a service to multiple users either directly or through virtual machines.    </span></p>


Author(s):  
Sovban Nisar ◽  
Deepika Arora

A structural design in which virtual machines are implicated and connect to the cloud service provider is called cloud computing. On the behalf of the users, the virtual machines connect to the cloud service provider. The uncertainties overload the virtual machines. The genetic algorithm is implemented for the migration of virtual machine in the earlier study. The genetic algorithm is low depicts latency within the network is high at the time of virtual machine migration. The genetic algorithm is implemented for virtual machine migration in this study. The proposed algorithm is applied in MATLAB in this work. The obtained results are compared with the results of earlier algorithm. Various parameters like latency, bandwidth consumption, and space utilization are used to analyze the achieved results.


2018 ◽  
Vol 6 (5) ◽  
pp. 340-345
Author(s):  
Rajat Pugaliya ◽  
Madhu B R

Cloud Computing is an emerging field in the IT industry. Cloud computing provides computing services over the Internet. Cloud Computing demand increasing drastically, which has enforced cloud service provider to ensure proper resource utilization with less cost and less energy consumption. In recent time various consolidation problems found in cloud computing like the task, VM, and server consolidation. These consolidation problems become challenging for resource utilization in cloud computing. We found in the literature review that there is a high level of coupling in resource utilization, cost, and energy consumption. The main challenge for cloud service provider is to maximize the resource utilization, reduce the cost and minimize the energy consumption. The dynamic task consolidation of virtual machines can be a way to solve the problem. This paper presents the comparative study of various task consolidation algorithms.


Cloud service provider in cloud environment will provide or provision resource based on demand from the user. The cloud service provider (CSP) will provide resources as and when required or demanded by the user for execution of the job on the cloud environment. The CSP will perform this in a static and dynamic manner. The CSP should also consider various other factors in order to provide the resources to the user, the prime among that will be the Service Level Agreement (SLA), which is normally signed by the user and cloud service provider during the inception phase of service. There are many algorithm which are used in order to allocate resources to the user in cloud environment. The algorithm which is proposed will be used to reduce the amount of energy utilized in performing various job execution in cloud environment. Here the energy utilized for execution of various jobs are taken into account by increasing the number of virtual machines that are used on a single physical host system. There is no thumb rule to calculate the number of virtual machines to be executed on a single host. The same can be derived by calculating the amount of space, speed required along with the time to execute the job on a virtual machine. Based up on this we can derive the number of Virtual machine on a single host system. There can be 10 virtual machines on a single system or even 20 number of virtual machines on single physical system. But if the same is calculated by the equation then the result will be exactly matching with the threshold capacity of the physical system[1]. If more number of physical systems are used to execute fewer virtual machines on each then the amount of energy consumed will be very high. So in order to reduce the energy consumption , the algorithm can be used will not only will help to calculate the number of virtual machines on single physical system , but also will help to reduce the energy as less number of physical systems will be in need[2].


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


2016 ◽  
Vol 2 (1) ◽  
Author(s):  
Alkiviadis Giannakoulias

Data security is a major concern in cloud computing environments as they provide much scope for intruders to attack. Data centres in cloud environments hold valid information that end-users would conventionally have stored on their computers. Moving information towards centralised services may have an adverse effect on the security of users’ interactions with files kept in cloud cupboard spaces[1], for example accidental or deliberate alterations or deletions of information from the cloud server by the Cloud Service Provider (CSP). This necessitates the deployment of some sort of mechanism to ensure the safety of information integrity[2]. Public sector organisations have much to gain by adopting a cloud computing approach to service delivery in their ICT environments. However, these benefits must be reaped without compromising core requirements and institutional values.This paper focuses on the security issues that may arise when public sector organisations consider transitioning to an Open Source Software (OSS) Infrastructure as a Service (IaaS) Cloud Infrastructure (OpenStack), although the same issues are likely to be found in other OSS cloud computing software like Apache CloudStack[3], Eucalyptus[4], and OpenNebula[5]. We examine legal implications, regulatory and standards compliance, new attack vectors resulting from vulnerabilities coming from virtualisation technologies, data integrity issues such as encryption and access controls, and security checks to be performed on the services prior to their movement to the cloud. In addition, some of the most important security threats in cloud computing are presented, followed by key recommendations on how to address them, namely security standards and certifications, service provider auditing, secure APIs, transport layer protection, authentication and encryption key management, and cloud service agreements.


Information security plays a vital role in cloud computing. Sensitive information should be kept in secure mode for providing integrity and confidentiality from insiders and outsiders. An insider is an employee who has legitimate access to cloud resources which are hosted at cloud data center. They can perform malicious activities on consumer sensitive data with or without malicious intent. This security beach is obvious and the provider needs to protect from such attacks. In this chapter, insider attacks are demonstrated with empirical approach to breach consumer-sensitive data. In this chapter, the authors present the threat models where an insider can manipulate user VMs in the node controller of cloud platform. Here, they assume that cloud service provider is malicious and cloud consumer does not have any security constraints to access their cloud assets. The model described two locations in the cloud infrastructure.


Author(s):  
Ebin Deni Raj ◽  
L. D. Dhinesh Babu

Cloud computing is the most utilized and evolving technology in the past few years and has taken computing to a whole new level such that even common man is receiving the benefits. The end user in cloud computing always prefers a cloud service provider which is efficient, reliable and best quality of service at the lowest possible price. A cloud based gaming system relieves the player from the burden of possessing high end processing and graphic units. The storage of games hosted in clouds using the latest technologies in cloud has been discussed in detail. The Quality of service of games hosted in cloud is the main focus of this chapter and we have proposed a mathematical model for the same. The various factors in dealing with the quality of service on cloud based games have been analyzed in detail. The quality of experience of cloud based games and its relation with quality of service has been derived. This chapter focuses on the various storage techniques, quality of experience factors and correlates the same with QoS in cloud based games.


Sign in / Sign up

Export Citation Format

Share Document