SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 3 Issue 1 ǁ Jan. 2015 ǁ PP.28-34
www.ijres.org 28 | Page
Generic Security Framework for Multiple Heterogeneous Virtual
Infrastructures
Darshan R, Chetan Raga
Department of Information Science and Engineering, RV College of Engineering, Bangalore-560059
Abstract - Virtualization continues to take center stage at IT industry, yet many organizations are finding it
difficult to secure virtualized environments. Security is a critical component in the growing IT system
surrounding virtualization. Many organizations find the security challenges associated with virtualization to be a
major hurdle, companies of all kinds across all industries are looking towards addressing business and security
needs in the virtual infrastructure. There are many research work done before about how to check the
compliance status of the cloud platform, not of the virtual machines running on the platform. This paper
proposes the security framework for multiple heterogeneous virtual machines which assess the compliance
security of the virtual machines. In this paper we make use of REST APIs, using which we create remote session
on the virtual machines and fetch the machine values which will be parsed to get the required values for
assessment.
Keywords – Security, Compliance, Virtual machines, REST APIs;
I. Introduction
In today‟s world of fast growing technology which expects good reliability, performance, scalability, cost,
agility, security and few other important characteristics, cloud and virtualization has taken its stake compared to
other traditional systems by far. This has resulted in drastic increase in the number of cloud vendors. The fact
that the vendors are increasing on day to day basis has helped the customers to compare among the vendors
based on the above mentioned characteristics and select the more appropriate vendors which suits their system.
But to compare among the vendors it is very difficult because the cloud computing is not completely
standardized which means there are no certain standardized method to build the system. This applies to security
compliance too, where we do not have standard set of security policies based on which the system has to be
developed. One of the major security obstacles to widespread adoption of cloud computing is the lack of near-
real-time audit ability [1]. And also the terms such as “risk,” ”threat,” and “vulnerability” are often used as if
they were interchangeable [2].
Cloud vendors should follow some standardized form of development process which abides by rules and
policies given by the security rules vendors of industry standards such as HIPAA [3], PCI etc. The most
important concern with cloud computing and virtualization is the various security issues. Although all major
cloud vendors provide security measures for their respective clients, it is highly impossible for a client to
compare and verify the security measures provided by different vendors under common security policies.
Taking this issue into consideration, Cloud security alliance (CSA) [4] has developed policies and guidelines to
facilitate a common and secure interface through which a cloud provider is able to provide security information
to their clients. Cloud audit is one such framework developed by CSA as a part of the Governance, Risk
Management and Compliance (GRC) stack. Cloud Audit mainly focuses on providing a common interface for
the auditing process for cloud vendors. Cloud control matrix (CMM) [6] is developed to guide cloud vendors
and its clients to assess the complete risk factors related to a particular cloud vendor. The other industry
accepted standards are ISACA COBIT [7], HIPAA [8], PCI DSS [9], ISO [10], and NIST [11].
The policies and framework provided from Cloud Audit and CCM are used to check the security
compliance of the system in which the related information flow from a cloud vendor, and there are also methods
to check how to automatically generate this compliance-related information [12]. But one thing which is still
under research is a generic framework which will allow clients to check for the security compliance of their
multiple systems such as windows systems, Linux systems as well as virtual systems. In order to develop a
generic framework for the security-compliance assessment process of multiple heterogeneous systems, we have
used various techniques that will allow us to obtain the required information.
This paper also includes the following sections: Section II introduces the background for issues in cloud
computing and security compliance. Section III gives an overview of the system architecture. Section IV gives
detailed flow of the proposed architecture. Section V, we briefly discusses two test cases that we have
implemented as proof-of-concept. In section VI, we present algorithm in section VII we discuss related works
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
www.ijres.org 29 | Page
in this field. Section VIII discusses analytical perspectives on the developed solution. And finally in Section XI,
we conclude our paper along with some suggestions for future work.
II. Security issues and Compliance check
There are number of security issues such as data security, trust, network traffic, multiple cloud tenants, need
for better access control, identity management etc, in this section we try to understand what exactly is security
compliance is all about. In the words of Bruce Schneier [13]:
“Computer security is a 40-year-old discipline; every year there's new research, new technologies, new
products, even new laws. And every year things get worse”.
This definition of the computer security gives and brief idea of how rapidly the change is happening in the
technological field. Hence there is significant necessity for developing the system which is highly secured and
compliant to the industry standards.
The Webster Dictionary defines compliance as: "conformity in fulfilling official requirements".
This paper focuses on security compliance for multiple heterogeneous machines. IT security requirements
can be classified into two types [14]:-
i) Functional requirements, which require some functional security feature such as mandatory access
control, and
ii) Assurance requirements, which specify the evidence needed to establish that the functional requirements
are met.
According to Klaus Julisch, IBM research the definition of the security compliance problem is as follows:
“Given an existing IT systems S and an externally imposed set R of security requirements, the security
compliance problem is to make system S comply with the security requirement R and to provide the assurance
that an independent auditor will accept as evidence of the compliance of system S with requirement R".
We can summarize this as every IT system irrespective of the kind of machine it is such as windows, Linux,
virtual machines, every machine should be compliant to the industry standard set of rules and policies given by
the vendors such as HIPAA [8], DISA, PCI [9], ISO [10], NIST [11] [23] etc, which guarantees by far how
secure the system is and what are the remediation‟s that are to be done if not compliant.
III. Difficulties in developing a generic framework
There are so many research works that are going on regarding the security compliance and building the
framework to support the security check based on the industry standards. But there are complexities in
developing a generic framework since we have to follow the guidelines given by different vendors.
 There are no standard set of generic rules to be followed.
 Very little guidance for implementation in the standards.
 Fetching data/information from different systems requires different methods.
 Correctness of security compliance.
The challenges and difficulties mentioned above are basic and generic problems that we have to address while
developing the generic framework. There are more complex challenges and difficulties that arise when
considering cloud and virtual machines. We propose a generic framework which will assess the compliance of
traditional machines as well as virtual machines. The block diagram is as shown in the fig.1.
IV. System Architecture
Fig.1 represents the system architecture that we have developed to build a generic framework for assessing
compliance of multiple heterogeneous machines. The main components of the proposed architecture are as
follows:
1) User: - User refers to both admin and the client who starts the process of assessment of the multiple
machines.
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
www.ijres.org 30 | Page
2) User Interface: - UI can be built using JAVA, in which we give textboxes to enter the credentials and a
button to click for assessment check.
3) Virtual Machines: - Machines may be any virtual machines, windows machine, Linux machines that we
are trying to connect and create a remote session on that machine. It may have „n‟ number of machines.
4) APIs/Scripts: - Session creation is done by using some APIs given by the vendors as well as by making
use of scripts written using Power shells, Power CLI, Perl scripts [19] etc,
5) DOM/SAX Parsers: - Fetching the required information from huge data that we get after using suitable
APIs has to be parsed according to the rules and policies of industry standards. DOM and SAX parsers
are the best available parsers [20] [21].
6) Database: - Database is used to store the values that are fetched from the system and also to store the
log.
7) Comparing framework: - After the process of parsing and fetching the required information, we have to
compare the values with the standard values given by the policy/rules vendors such as HIPAA, DISA
etc,
8) Report Generation: - The last part of the assessment process is generating the compliance report which
says whether the system or machine is compliant on particular rules or not. In this project we display
the report in the form of HTML page which gives the pictorial representation of the result.
As represented in the figure, we can use different approaches to create a remote session with the
machines such as using APIs like REST APIs which uses HTTP protocol for communication [18], java
APIs, and we can do the same using scripts such as Power shell scripts, Power CLI scripts, shell scripts etc,
The workflow of the REST is explained in this section in which we make an 1) HTTP request normally
GET, PUT, POST, and DELETE. The target of the given request will be either a well known URL or the
URL obtained from the xml response to an earlier request. 2) HTTP response includes a body, usually the
response body will be the xml representation of an object, which includes elements and attributes that
represents particular object properties also the links that implement operations on the object or provide
references to containing objects. The response also includes HTTP response code, indicating whether the
request succeeded or failed, and might be accompanied by a URL [16].
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
www.ijres.org 31 | Page
V. Phases of Algorithm for assessing compliance
Step 1: - User credential authentication
The user credentials for the multiple machines are given by the clients, the process initiates in this manner
and followed by authentication of the credentials. If the username, password, IP address are given correctly by
the user only then the process starts.
Step 2: - Creating the remote session on the machines
The second step is creating the remote session with machines whose credentials are given by the customers.
To create the remote session we use APIs, scripts etc, from which we try to fetch as many information such as
network security, storage security, data security, system security etc
Step 3: - Select the rules and policies given by industry standards
Selecting the different rules and policies given by the industry standards on which the assessment has to run
will be done in this step. High priority rules are selected which we later implement. To implement the rules we
write scripts through which the job is done easier compared to other methods.
Step 4: - Fetch the information from remote machine
After creating the remote session we fetch the system values regarding the network, storage, system
security. This information that we fetch will be used to compare with the standard values and assess the
compliance.
Step 5: - Parsing and validating the information
The information that we fetch will be huge and we have to parse only the required system values and to do
this we use DOM/SAX parser where we write java code to parse the required information.
Step 6: - Assessment framework
After parsing the required values we compare those values with the standard values and check whether the
system is compliant to those standard rules given.
Step 7:- Progress details
During the whole process the progress of the assessment is shown to the user which indicates the
percentage of process completion, machine on which the assessment is going on at that particular moment, the
rules being assessed and so on.
Step 8:- Assessment report
The final step of the assessment process is generating a result report, we have developed a HTML report
where we make use of java scripts and display the result through HTML page.
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
www.ijres.org 32 | Page
VI. Flow Chart for Assessment
Fig. 3 Flow chart
The fig. 3 represents the flow chart for the development of generic assessment framework, where we have
the flow of the whole process starting from connecting and creating a remote session and fetching all the
required information, comparing with the standard values and generating the compliance result.
VII. Results and Comparison
For the sake of demonstration we have implemented our framework on three heterogeneous virtual systems
which are related to different industry standards rules given by HIPAA, PCI, and so on. The graph represents the
number of rules that are compliant with the standard values given by the vendors. As we can see in the fig.4 for
use case-1 there are 3 cases in which the first virtual system shows that there are 28 rules out of 40 rules selected
which are compliant and rest 12 are not compliant. Similarly, the second virtual system has 25 rules and out of
which only 13 are compliant and third system has 12 rules in which 10 are compliant. For use case-2 as in the
fig.5, we have 5 machines in which the number of rules implemented for each machines are 15, 40, 10, 25, 30
respectively and rules which are compliant to the industry standards are 12, 24, 7, 16, 24.
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
www.ijres.org 33 | Page
Fig.4 Graphical representation of use case-1
Fig.5 Graphical representation of use case-2
VIII. Discussion
Data security in the world of virtual system and cloud computing has a vast research going on all over the
world [22]. There are few frameworks which assess the security compliance of the cloud systems but there were
no generic frameworks as such. The generic framework has benefited the client in many ways where
tremendous amount of work load is reduced by allowing the customers to check for the compliance of their
multiple heterogeneous systems at one shot. Let it be a virtual cloud, virtual machines any virtual
infrastructures. The clients can be aware of the security related issues in their organization and can have a failure
free organization. The framework allows the customers to check the whole system compliance at once it
becomes cost effective too whereas before in order to check for the security compliance of their organization the
clients had to use different tools for different systems. In these many ways the generic framework for
compliance assessment has benefited the users.
The framework that we have explained in this paper gives the user the report which indicates the number of
rules for which the system is compliant. What to do for those rules for which the system is not compliant?
Hence this becomes scope for future enhancement where we have to develop a framework which enforces the
client to change the system values such that the system becomes compliant to all the rules given by the industry
standards. And also the remediation can be taken up as a future scope where the admin has the power to change
the values when he comes to know that the system is not compliant on particular rules.
IX. Conclusion
In this paper we have presented architecture to build a generic tool/framework for assessing the compliance
check on multiple heterogeneous systems. We started with mentioning the security issues and introduction on
compliance check. Later in the paper we discussed the difficulties in developing a generic framework for
assessing the compliance of the system. The architecture for the generic framework gives the core components
involved in building the framework such as REST APIs, Power CLI scripts, parsers, comparing frameworks,
Java scripts, HTML and so on. Later we have presented the algorithm and the flow chart for the framework
development where we can see the step by step procedure of the whole process. Next we compare the results
obtained from the use cases that we have taken to demonstrate the compliance check on multiple systems.
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
www.ijres.org 34 | Page
References
[1] J. Park, E. Spetka, H. Rasheed, P. Ratazzi, and K. Han, “Near-real-time cloud auditing for rapid response,” in Advanced
Information Networking and Applications Workshops (WAINA), 2012 26th International Conference on IEEE, March 2012, pp.
1252 –1257.
[2] Grobauer, B, Walloschek, T, Stocker. E, "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE, vol.9,
no.2, March-April 2011, pp.50-57.
[3] “HIPAA and QMS Based Architectural Requirements to Cope with the OCR Audit Program”, Gardazi, S.U, Shahid, A.A,
Salimbene, C. Mobile, Ubiquitous, and Intelligent Computing (MUSIC) 2012 Third FTRA International Conference on Digital
Object Identifier: 10.1109/MUSIC.2012.50, Publication Year: 2012, Page(s): 246-253.
[4] “Cloud Security Alliance,” https://cloudsecurityalliance.org/ [accessed 13.03.2013].
[5] “Cloud Audit,” https://cloudsecurityalliance.org/research/cloudaudit/ [accessed 13.03.2013].
[6] “Cloud Control Matrix (CCM): Cloud Security Alliance,” https://cloudsecurityalliance.org/research/ ccm/ [accessed 13.03.2013].
[7] “COBIT-IT Governance Framework - Information Assurance Control — ISACA,” http://www.isaca.org/Knowledge-
Center/cobit/Pages/Overview.aspx [accessed 19.09.2012].
[8] “Understanding Health Information Privacy,” http://www.hhs.gov/ocr/privacy/hipaa/understanding/ index.html [accessed
19.10.2012].
[9] “Official Source of PCI DSS Data Security Standards,” https://www.pcisecuritystandards.org/security standards/index.php
[accessed 18.10.2012].
[10] “ISO 27001, ISO27001 Information Security Standard,” http://www.itgovernance.co.uk/iso27001.aspx [accessed 19.09.2012].
[11] “NIST.gov - Computer Security Division - Computer Security resource Center,” http://csrc.nist.gov/ publications/PubsDrafts.html
[accessed 20.09.2012].
[12] “Towards Building an Automated Security Compliance Tool for the Cloud”, Ullah, K.W, Ahmed, A.S, Ylitalo, J. Trust, Security
and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on Digital Object
Identifier: 10.1109/TrustCom.2013.195 Publication Year: 2013, Page(s): 1587-1593.
[13] “Testimony and Statement for the Record of Bruce Schneier”, on http://www.iwar.org.uk, 2001.
[14] Security Compliance: The Next Frontier in Security Research, Klaus Julisch IBM Research Säumerstrasse 4 8803 Rüschlikon,
Switzerland kju@zurich.ibm.com.
[15] “Scripting JAX-WS [JavaScript]” Vinoski, S. Internet Computing, IEEE Volume: 10, Issue: 3Digital Object Identifier:
10.1109/MIC.2006.65 Publication Year: 2006, Page(s): 91-94.
[16] “Construction Methodology for a Remote Ultrasound Diagnostic System”, Koizumi, N, 2009 Robotics, IEEE Transactions on
(Volume:25, Issue: 3 ).
[17] “Mashup service release based on SOAP and REST”, Huijie Su ; Bo Cheng ; Tong Wu ; Xiaofeng Li Computer Science and
Network Technology (ICCSNT), 2011 International Conference on Volume:2 Digital Object
Identifier:10.1109/ICCSNT.2011.6182150, Publication Year: 2011, Page(s): 1091-1095.
[18] “Modeling the performance of HTTP over several transport protocols”, Heidemann, J, Obraczka, K. ; Touch, J.Networking,
IEEE/ACM Transactions on Volume:5, Digital Object Identifier: 10.1109/90.649564, Publication Year: 1997 , Page(s):616-630.
[19] "Perl: not just for Web programming",Dominus, M.-J. Software, IEEE Volume:15, Digital Object Identifier: 10.1109/52.646885,
Publication Year: 1998, Page(s): 69-74.
[20] "Parallel Speculative Dom-based XML Parser", Ma Jianliang ; Shaobin Zhang ; Tongsen Hu ; Minghui Wu ; Tianzhou Chen,
High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and
Systems (HPCC-ICESS), 2012 IEEE 14th International Conference on Digital Object Identifier: 10.1109/HPCC.2012.15,
Publication Year: 2012, Page(s): 33-40.
[21] "The Application and Analysis of Netconf Subtree Filtering Based on SAX and DOM", Yazhou Xiang ; Bin Zhang ; Guohui Li ;
Yan Li ; Xuesong Gao, 2010 International Conference on Volume: 3,Digital Object Identifier: 10.1109/ICMTMA.2010.562,
Publication Year:2010, Page(s):758-761.
[22] “Data Security in the World of Cloud Computing”, Kaufman, L.M. Security & Privacy, IEEE, Issue: 4, Publication Year: 2009,
Page(s): 61-64.
[23] “Guidelines on security and privacy in public cloud computing,” W. Jansen and T. Grance, Special Report 800-144, National
Institutes of Standards and Technology (NIST), Gaithersburg, MD, January 2011.

Contenu connexe

Tendances

Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...iosrjce
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challengespaperpublications3
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceAustin Eppstein
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture IJECEIAES
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computingijsrd.com
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computingijcsa
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud DrainEswar Publications
 
Security for v mware
Security for v mwareSecurity for v mware
Security for v mwareReadWrite
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327vimal Kumar Gupta
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Unisys Corporation
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 

Tendances (19)

Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computing
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
Security for v mware
Security for v mwareSecurity for v mware
Security for v mware
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Vertualisation
VertualisationVertualisation
Vertualisation
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 

En vedette

Mechanism Design and Debugging of an Intelligent Rehabilitation Nursing Bed
Mechanism Design and Debugging of an Intelligent Rehabilitation Nursing BedMechanism Design and Debugging of an Intelligent Rehabilitation Nursing Bed
Mechanism Design and Debugging of an Intelligent Rehabilitation Nursing BedIJRES Journal
 
Strength Analysis and Optimization Design about the key parts of the Robot
Strength Analysis and Optimization Design about the key parts of the RobotStrength Analysis and Optimization Design about the key parts of the Robot
Strength Analysis and Optimization Design about the key parts of the RobotIJRES Journal
 
Investigation into the Energy Demand for Palm Nut Cracking Using the Static I...
Investigation into the Energy Demand for Palm Nut Cracking Using the Static I...Investigation into the Energy Demand for Palm Nut Cracking Using the Static I...
Investigation into the Energy Demand for Palm Nut Cracking Using the Static I...IJRES Journal
 
Prevalence Of Urinary Schistosomiasis Among Pupils Attending Primary Schools ...
Prevalence Of Urinary Schistosomiasis Among Pupils Attending Primary Schools ...Prevalence Of Urinary Schistosomiasis Among Pupils Attending Primary Schools ...
Prevalence Of Urinary Schistosomiasis Among Pupils Attending Primary Schools ...IJRES Journal
 
Building an Ontology in Educational Domain Case Study for the University of P...
Building an Ontology in Educational Domain Case Study for the University of P...Building an Ontology in Educational Domain Case Study for the University of P...
Building an Ontology in Educational Domain Case Study for the University of P...IJRES Journal
 
The Construction of Virtual Surgical Clamp Based on the Haptic Feedback System
The Construction of Virtual Surgical Clamp Based on the Haptic Feedback SystemThe Construction of Virtual Surgical Clamp Based on the Haptic Feedback System
The Construction of Virtual Surgical Clamp Based on the Haptic Feedback SystemIJRES Journal
 
Design Topology of Low Profile Transformer forSlim Adaptor
Design Topology of Low Profile Transformer forSlim AdaptorDesign Topology of Low Profile Transformer forSlim Adaptor
Design Topology of Low Profile Transformer forSlim AdaptorIJRES Journal
 
Legendre Wavelet for Solving Linear System of Fredholm And Volterra Integral ...
Legendre Wavelet for Solving Linear System of Fredholm And Volterra Integral ...Legendre Wavelet for Solving Linear System of Fredholm And Volterra Integral ...
Legendre Wavelet for Solving Linear System of Fredholm And Volterra Integral ...IJRES Journal
 
Optimization of iron load in a natural zeolite for heterogeneous catalysis
Optimization of iron load in a natural zeolite for heterogeneous catalysisOptimization of iron load in a natural zeolite for heterogeneous catalysis
Optimization of iron load in a natural zeolite for heterogeneous catalysisIJRES Journal
 
About the Phasor Pathways in Analogical Amplitude Modulations
About the Phasor Pathways in Analogical Amplitude ModulationsAbout the Phasor Pathways in Analogical Amplitude Modulations
About the Phasor Pathways in Analogical Amplitude ModulationsIJRES Journal
 
A New Mathematical Model for Minimization of Exceptional Load in Cellular Man...
A New Mathematical Model for Minimization of Exceptional Load in Cellular Man...A New Mathematical Model for Minimization of Exceptional Load in Cellular Man...
A New Mathematical Model for Minimization of Exceptional Load in Cellular Man...IJRES Journal
 
Dependence Of Energy Efficiency Indices On Individual Energy Technological Pr...
Dependence Of Energy Efficiency Indices On Individual Energy Technological Pr...Dependence Of Energy Efficiency Indices On Individual Energy Technological Pr...
Dependence Of Energy Efficiency Indices On Individual Energy Technological Pr...IJRES Journal
 
Numerical Experiments of Hydrogen-Air Premixed Flames
Numerical Experiments of Hydrogen-Air Premixed FlamesNumerical Experiments of Hydrogen-Air Premixed Flames
Numerical Experiments of Hydrogen-Air Premixed FlamesIJRES Journal
 
Methodology of Assessment Vulnerability of Soil Cover in Slovakia
Methodology of Assessment Vulnerability of Soil Cover in SlovakiaMethodology of Assessment Vulnerability of Soil Cover in Slovakia
Methodology of Assessment Vulnerability of Soil Cover in SlovakiaIJRES Journal
 
Time Truncated Modified Chain Sampling Plan for Selected Distributions
Time Truncated Modified Chain Sampling Plan for Selected DistributionsTime Truncated Modified Chain Sampling Plan for Selected Distributions
Time Truncated Modified Chain Sampling Plan for Selected DistributionsIJRES Journal
 
A New Detection Method for Self-lubricating Spherical Plain Bearing Woven Lin...
A New Detection Method for Self-lubricating Spherical Plain Bearing Woven Lin...A New Detection Method for Self-lubricating Spherical Plain Bearing Woven Lin...
A New Detection Method for Self-lubricating Spherical Plain Bearing Woven Lin...IJRES Journal
 
OMR Form Inspection by Web Camera Using Shape-Based Matching Approach
OMR Form Inspection by Web Camera Using Shape-Based Matching ApproachOMR Form Inspection by Web Camera Using Shape-Based Matching Approach
OMR Form Inspection by Web Camera Using Shape-Based Matching ApproachIJRES Journal
 
Real Time Condition Monitoring of Power Plant through DNP3 Protocol
Real Time Condition Monitoring of Power Plant through DNP3 ProtocolReal Time Condition Monitoring of Power Plant through DNP3 Protocol
Real Time Condition Monitoring of Power Plant through DNP3 ProtocolIJRES Journal
 
Optical Fiber Device For Coupling A Composite-Type Optical Fiber Scope And Pu...
Optical Fiber Device For Coupling A Composite-Type Optical Fiber Scope And Pu...Optical Fiber Device For Coupling A Composite-Type Optical Fiber Scope And Pu...
Optical Fiber Device For Coupling A Composite-Type Optical Fiber Scope And Pu...IJRES Journal
 

En vedette (19)

Mechanism Design and Debugging of an Intelligent Rehabilitation Nursing Bed
Mechanism Design and Debugging of an Intelligent Rehabilitation Nursing BedMechanism Design and Debugging of an Intelligent Rehabilitation Nursing Bed
Mechanism Design and Debugging of an Intelligent Rehabilitation Nursing Bed
 
Strength Analysis and Optimization Design about the key parts of the Robot
Strength Analysis and Optimization Design about the key parts of the RobotStrength Analysis and Optimization Design about the key parts of the Robot
Strength Analysis and Optimization Design about the key parts of the Robot
 
Investigation into the Energy Demand for Palm Nut Cracking Using the Static I...
Investigation into the Energy Demand for Palm Nut Cracking Using the Static I...Investigation into the Energy Demand for Palm Nut Cracking Using the Static I...
Investigation into the Energy Demand for Palm Nut Cracking Using the Static I...
 
Prevalence Of Urinary Schistosomiasis Among Pupils Attending Primary Schools ...
Prevalence Of Urinary Schistosomiasis Among Pupils Attending Primary Schools ...Prevalence Of Urinary Schistosomiasis Among Pupils Attending Primary Schools ...
Prevalence Of Urinary Schistosomiasis Among Pupils Attending Primary Schools ...
 
Building an Ontology in Educational Domain Case Study for the University of P...
Building an Ontology in Educational Domain Case Study for the University of P...Building an Ontology in Educational Domain Case Study for the University of P...
Building an Ontology in Educational Domain Case Study for the University of P...
 
The Construction of Virtual Surgical Clamp Based on the Haptic Feedback System
The Construction of Virtual Surgical Clamp Based on the Haptic Feedback SystemThe Construction of Virtual Surgical Clamp Based on the Haptic Feedback System
The Construction of Virtual Surgical Clamp Based on the Haptic Feedback System
 
Design Topology of Low Profile Transformer forSlim Adaptor
Design Topology of Low Profile Transformer forSlim AdaptorDesign Topology of Low Profile Transformer forSlim Adaptor
Design Topology of Low Profile Transformer forSlim Adaptor
 
Legendre Wavelet for Solving Linear System of Fredholm And Volterra Integral ...
Legendre Wavelet for Solving Linear System of Fredholm And Volterra Integral ...Legendre Wavelet for Solving Linear System of Fredholm And Volterra Integral ...
Legendre Wavelet for Solving Linear System of Fredholm And Volterra Integral ...
 
Optimization of iron load in a natural zeolite for heterogeneous catalysis
Optimization of iron load in a natural zeolite for heterogeneous catalysisOptimization of iron load in a natural zeolite for heterogeneous catalysis
Optimization of iron load in a natural zeolite for heterogeneous catalysis
 
About the Phasor Pathways in Analogical Amplitude Modulations
About the Phasor Pathways in Analogical Amplitude ModulationsAbout the Phasor Pathways in Analogical Amplitude Modulations
About the Phasor Pathways in Analogical Amplitude Modulations
 
A New Mathematical Model for Minimization of Exceptional Load in Cellular Man...
A New Mathematical Model for Minimization of Exceptional Load in Cellular Man...A New Mathematical Model for Minimization of Exceptional Load in Cellular Man...
A New Mathematical Model for Minimization of Exceptional Load in Cellular Man...
 
Dependence Of Energy Efficiency Indices On Individual Energy Technological Pr...
Dependence Of Energy Efficiency Indices On Individual Energy Technological Pr...Dependence Of Energy Efficiency Indices On Individual Energy Technological Pr...
Dependence Of Energy Efficiency Indices On Individual Energy Technological Pr...
 
Numerical Experiments of Hydrogen-Air Premixed Flames
Numerical Experiments of Hydrogen-Air Premixed FlamesNumerical Experiments of Hydrogen-Air Premixed Flames
Numerical Experiments of Hydrogen-Air Premixed Flames
 
Methodology of Assessment Vulnerability of Soil Cover in Slovakia
Methodology of Assessment Vulnerability of Soil Cover in SlovakiaMethodology of Assessment Vulnerability of Soil Cover in Slovakia
Methodology of Assessment Vulnerability of Soil Cover in Slovakia
 
Time Truncated Modified Chain Sampling Plan for Selected Distributions
Time Truncated Modified Chain Sampling Plan for Selected DistributionsTime Truncated Modified Chain Sampling Plan for Selected Distributions
Time Truncated Modified Chain Sampling Plan for Selected Distributions
 
A New Detection Method for Self-lubricating Spherical Plain Bearing Woven Lin...
A New Detection Method for Self-lubricating Spherical Plain Bearing Woven Lin...A New Detection Method for Self-lubricating Spherical Plain Bearing Woven Lin...
A New Detection Method for Self-lubricating Spherical Plain Bearing Woven Lin...
 
OMR Form Inspection by Web Camera Using Shape-Based Matching Approach
OMR Form Inspection by Web Camera Using Shape-Based Matching ApproachOMR Form Inspection by Web Camera Using Shape-Based Matching Approach
OMR Form Inspection by Web Camera Using Shape-Based Matching Approach
 
Real Time Condition Monitoring of Power Plant through DNP3 Protocol
Real Time Condition Monitoring of Power Plant through DNP3 ProtocolReal Time Condition Monitoring of Power Plant through DNP3 Protocol
Real Time Condition Monitoring of Power Plant through DNP3 Protocol
 
Optical Fiber Device For Coupling A Composite-Type Optical Fiber Scope And Pu...
Optical Fiber Device For Coupling A Composite-Type Optical Fiber Scope And Pu...Optical Fiber Device For Coupling A Composite-Type Optical Fiber Scope And Pu...
Optical Fiber Device For Coupling A Composite-Type Optical Fiber Scope And Pu...
 

Similaire à Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures

A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingYolanda Ivey
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...cscpconf
 
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...csandit
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docxRAHUL126667
 
A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudJeff Nelson
 
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudDetailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudIRJET Journal
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingeSAT Journals
 
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...ijcnes
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloudeSAT Publishing House
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4sophiabelthome
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management ActMichelle Singh
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudLockheed Martin
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices FrameworkSujata Raskar
 

Similaire à Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures (20)

A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
 
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
 
A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise Cloud
 
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudDetailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the Cloud
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 

Plus de IJRES Journal

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...IJRES Journal
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...IJRES Journal
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityIJRES Journal
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...IJRES Journal
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesIJRES Journal
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresIJRES Journal
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodIJRES Journal
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningIJRES Journal
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchIJRES Journal
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowIJRES Journal
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...IJRES Journal
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsIJRES Journal
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalIJRES Journal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...IJRES Journal
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...IJRES Journal
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesIJRES Journal
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...IJRES Journal
 

Plus de IJRES Journal (20)

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil properties
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their Structures
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible Rod
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioning
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision Workbench
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and Now
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirs
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound Signal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubes
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
 

Dernier

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 

Dernier (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 

Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures

  • 1. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 3 Issue 1 ǁ Jan. 2015 ǁ PP.28-34 www.ijres.org 28 | Page Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures Darshan R, Chetan Raga Department of Information Science and Engineering, RV College of Engineering, Bangalore-560059 Abstract - Virtualization continues to take center stage at IT industry, yet many organizations are finding it difficult to secure virtualized environments. Security is a critical component in the growing IT system surrounding virtualization. Many organizations find the security challenges associated with virtualization to be a major hurdle, companies of all kinds across all industries are looking towards addressing business and security needs in the virtual infrastructure. There are many research work done before about how to check the compliance status of the cloud platform, not of the virtual machines running on the platform. This paper proposes the security framework for multiple heterogeneous virtual machines which assess the compliance security of the virtual machines. In this paper we make use of REST APIs, using which we create remote session on the virtual machines and fetch the machine values which will be parsed to get the required values for assessment. Keywords – Security, Compliance, Virtual machines, REST APIs; I. Introduction In today‟s world of fast growing technology which expects good reliability, performance, scalability, cost, agility, security and few other important characteristics, cloud and virtualization has taken its stake compared to other traditional systems by far. This has resulted in drastic increase in the number of cloud vendors. The fact that the vendors are increasing on day to day basis has helped the customers to compare among the vendors based on the above mentioned characteristics and select the more appropriate vendors which suits their system. But to compare among the vendors it is very difficult because the cloud computing is not completely standardized which means there are no certain standardized method to build the system. This applies to security compliance too, where we do not have standard set of security policies based on which the system has to be developed. One of the major security obstacles to widespread adoption of cloud computing is the lack of near- real-time audit ability [1]. And also the terms such as “risk,” ”threat,” and “vulnerability” are often used as if they were interchangeable [2]. Cloud vendors should follow some standardized form of development process which abides by rules and policies given by the security rules vendors of industry standards such as HIPAA [3], PCI etc. The most important concern with cloud computing and virtualization is the various security issues. Although all major cloud vendors provide security measures for their respective clients, it is highly impossible for a client to compare and verify the security measures provided by different vendors under common security policies. Taking this issue into consideration, Cloud security alliance (CSA) [4] has developed policies and guidelines to facilitate a common and secure interface through which a cloud provider is able to provide security information to their clients. Cloud audit is one such framework developed by CSA as a part of the Governance, Risk Management and Compliance (GRC) stack. Cloud Audit mainly focuses on providing a common interface for the auditing process for cloud vendors. Cloud control matrix (CMM) [6] is developed to guide cloud vendors and its clients to assess the complete risk factors related to a particular cloud vendor. The other industry accepted standards are ISACA COBIT [7], HIPAA [8], PCI DSS [9], ISO [10], and NIST [11]. The policies and framework provided from Cloud Audit and CCM are used to check the security compliance of the system in which the related information flow from a cloud vendor, and there are also methods to check how to automatically generate this compliance-related information [12]. But one thing which is still under research is a generic framework which will allow clients to check for the security compliance of their multiple systems such as windows systems, Linux systems as well as virtual systems. In order to develop a generic framework for the security-compliance assessment process of multiple heterogeneous systems, we have used various techniques that will allow us to obtain the required information. This paper also includes the following sections: Section II introduces the background for issues in cloud computing and security compliance. Section III gives an overview of the system architecture. Section IV gives detailed flow of the proposed architecture. Section V, we briefly discusses two test cases that we have implemented as proof-of-concept. In section VI, we present algorithm in section VII we discuss related works
  • 2. Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures www.ijres.org 29 | Page in this field. Section VIII discusses analytical perspectives on the developed solution. And finally in Section XI, we conclude our paper along with some suggestions for future work. II. Security issues and Compliance check There are number of security issues such as data security, trust, network traffic, multiple cloud tenants, need for better access control, identity management etc, in this section we try to understand what exactly is security compliance is all about. In the words of Bruce Schneier [13]: “Computer security is a 40-year-old discipline; every year there's new research, new technologies, new products, even new laws. And every year things get worse”. This definition of the computer security gives and brief idea of how rapidly the change is happening in the technological field. Hence there is significant necessity for developing the system which is highly secured and compliant to the industry standards. The Webster Dictionary defines compliance as: "conformity in fulfilling official requirements". This paper focuses on security compliance for multiple heterogeneous machines. IT security requirements can be classified into two types [14]:- i) Functional requirements, which require some functional security feature such as mandatory access control, and ii) Assurance requirements, which specify the evidence needed to establish that the functional requirements are met. According to Klaus Julisch, IBM research the definition of the security compliance problem is as follows: “Given an existing IT systems S and an externally imposed set R of security requirements, the security compliance problem is to make system S comply with the security requirement R and to provide the assurance that an independent auditor will accept as evidence of the compliance of system S with requirement R". We can summarize this as every IT system irrespective of the kind of machine it is such as windows, Linux, virtual machines, every machine should be compliant to the industry standard set of rules and policies given by the vendors such as HIPAA [8], DISA, PCI [9], ISO [10], NIST [11] [23] etc, which guarantees by far how secure the system is and what are the remediation‟s that are to be done if not compliant. III. Difficulties in developing a generic framework There are so many research works that are going on regarding the security compliance and building the framework to support the security check based on the industry standards. But there are complexities in developing a generic framework since we have to follow the guidelines given by different vendors.  There are no standard set of generic rules to be followed.  Very little guidance for implementation in the standards.  Fetching data/information from different systems requires different methods.  Correctness of security compliance. The challenges and difficulties mentioned above are basic and generic problems that we have to address while developing the generic framework. There are more complex challenges and difficulties that arise when considering cloud and virtual machines. We propose a generic framework which will assess the compliance of traditional machines as well as virtual machines. The block diagram is as shown in the fig.1. IV. System Architecture Fig.1 represents the system architecture that we have developed to build a generic framework for assessing compliance of multiple heterogeneous machines. The main components of the proposed architecture are as follows: 1) User: - User refers to both admin and the client who starts the process of assessment of the multiple machines.
  • 3. Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures www.ijres.org 30 | Page 2) User Interface: - UI can be built using JAVA, in which we give textboxes to enter the credentials and a button to click for assessment check. 3) Virtual Machines: - Machines may be any virtual machines, windows machine, Linux machines that we are trying to connect and create a remote session on that machine. It may have „n‟ number of machines. 4) APIs/Scripts: - Session creation is done by using some APIs given by the vendors as well as by making use of scripts written using Power shells, Power CLI, Perl scripts [19] etc, 5) DOM/SAX Parsers: - Fetching the required information from huge data that we get after using suitable APIs has to be parsed according to the rules and policies of industry standards. DOM and SAX parsers are the best available parsers [20] [21]. 6) Database: - Database is used to store the values that are fetched from the system and also to store the log. 7) Comparing framework: - After the process of parsing and fetching the required information, we have to compare the values with the standard values given by the policy/rules vendors such as HIPAA, DISA etc, 8) Report Generation: - The last part of the assessment process is generating the compliance report which says whether the system or machine is compliant on particular rules or not. In this project we display the report in the form of HTML page which gives the pictorial representation of the result. As represented in the figure, we can use different approaches to create a remote session with the machines such as using APIs like REST APIs which uses HTTP protocol for communication [18], java APIs, and we can do the same using scripts such as Power shell scripts, Power CLI scripts, shell scripts etc, The workflow of the REST is explained in this section in which we make an 1) HTTP request normally GET, PUT, POST, and DELETE. The target of the given request will be either a well known URL or the URL obtained from the xml response to an earlier request. 2) HTTP response includes a body, usually the response body will be the xml representation of an object, which includes elements and attributes that represents particular object properties also the links that implement operations on the object or provide references to containing objects. The response also includes HTTP response code, indicating whether the request succeeded or failed, and might be accompanied by a URL [16].
  • 4. Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures www.ijres.org 31 | Page V. Phases of Algorithm for assessing compliance Step 1: - User credential authentication The user credentials for the multiple machines are given by the clients, the process initiates in this manner and followed by authentication of the credentials. If the username, password, IP address are given correctly by the user only then the process starts. Step 2: - Creating the remote session on the machines The second step is creating the remote session with machines whose credentials are given by the customers. To create the remote session we use APIs, scripts etc, from which we try to fetch as many information such as network security, storage security, data security, system security etc Step 3: - Select the rules and policies given by industry standards Selecting the different rules and policies given by the industry standards on which the assessment has to run will be done in this step. High priority rules are selected which we later implement. To implement the rules we write scripts through which the job is done easier compared to other methods. Step 4: - Fetch the information from remote machine After creating the remote session we fetch the system values regarding the network, storage, system security. This information that we fetch will be used to compare with the standard values and assess the compliance. Step 5: - Parsing and validating the information The information that we fetch will be huge and we have to parse only the required system values and to do this we use DOM/SAX parser where we write java code to parse the required information. Step 6: - Assessment framework After parsing the required values we compare those values with the standard values and check whether the system is compliant to those standard rules given. Step 7:- Progress details During the whole process the progress of the assessment is shown to the user which indicates the percentage of process completion, machine on which the assessment is going on at that particular moment, the rules being assessed and so on. Step 8:- Assessment report The final step of the assessment process is generating a result report, we have developed a HTML report where we make use of java scripts and display the result through HTML page.
  • 5. Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures www.ijres.org 32 | Page VI. Flow Chart for Assessment Fig. 3 Flow chart The fig. 3 represents the flow chart for the development of generic assessment framework, where we have the flow of the whole process starting from connecting and creating a remote session and fetching all the required information, comparing with the standard values and generating the compliance result. VII. Results and Comparison For the sake of demonstration we have implemented our framework on three heterogeneous virtual systems which are related to different industry standards rules given by HIPAA, PCI, and so on. The graph represents the number of rules that are compliant with the standard values given by the vendors. As we can see in the fig.4 for use case-1 there are 3 cases in which the first virtual system shows that there are 28 rules out of 40 rules selected which are compliant and rest 12 are not compliant. Similarly, the second virtual system has 25 rules and out of which only 13 are compliant and third system has 12 rules in which 10 are compliant. For use case-2 as in the fig.5, we have 5 machines in which the number of rules implemented for each machines are 15, 40, 10, 25, 30 respectively and rules which are compliant to the industry standards are 12, 24, 7, 16, 24.
  • 6. Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures www.ijres.org 33 | Page Fig.4 Graphical representation of use case-1 Fig.5 Graphical representation of use case-2 VIII. Discussion Data security in the world of virtual system and cloud computing has a vast research going on all over the world [22]. There are few frameworks which assess the security compliance of the cloud systems but there were no generic frameworks as such. The generic framework has benefited the client in many ways where tremendous amount of work load is reduced by allowing the customers to check for the compliance of their multiple heterogeneous systems at one shot. Let it be a virtual cloud, virtual machines any virtual infrastructures. The clients can be aware of the security related issues in their organization and can have a failure free organization. The framework allows the customers to check the whole system compliance at once it becomes cost effective too whereas before in order to check for the security compliance of their organization the clients had to use different tools for different systems. In these many ways the generic framework for compliance assessment has benefited the users. The framework that we have explained in this paper gives the user the report which indicates the number of rules for which the system is compliant. What to do for those rules for which the system is not compliant? Hence this becomes scope for future enhancement where we have to develop a framework which enforces the client to change the system values such that the system becomes compliant to all the rules given by the industry standards. And also the remediation can be taken up as a future scope where the admin has the power to change the values when he comes to know that the system is not compliant on particular rules. IX. Conclusion In this paper we have presented architecture to build a generic tool/framework for assessing the compliance check on multiple heterogeneous systems. We started with mentioning the security issues and introduction on compliance check. Later in the paper we discussed the difficulties in developing a generic framework for assessing the compliance of the system. The architecture for the generic framework gives the core components involved in building the framework such as REST APIs, Power CLI scripts, parsers, comparing frameworks, Java scripts, HTML and so on. Later we have presented the algorithm and the flow chart for the framework development where we can see the step by step procedure of the whole process. Next we compare the results obtained from the use cases that we have taken to demonstrate the compliance check on multiple systems.
  • 7. Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures www.ijres.org 34 | Page References [1] J. Park, E. Spetka, H. Rasheed, P. Ratazzi, and K. Han, “Near-real-time cloud auditing for rapid response,” in Advanced Information Networking and Applications Workshops (WAINA), 2012 26th International Conference on IEEE, March 2012, pp. 1252 –1257. [2] Grobauer, B, Walloschek, T, Stocker. E, "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE, vol.9, no.2, March-April 2011, pp.50-57. [3] “HIPAA and QMS Based Architectural Requirements to Cope with the OCR Audit Program”, Gardazi, S.U, Shahid, A.A, Salimbene, C. Mobile, Ubiquitous, and Intelligent Computing (MUSIC) 2012 Third FTRA International Conference on Digital Object Identifier: 10.1109/MUSIC.2012.50, Publication Year: 2012, Page(s): 246-253. [4] “Cloud Security Alliance,” https://cloudsecurityalliance.org/ [accessed 13.03.2013]. [5] “Cloud Audit,” https://cloudsecurityalliance.org/research/cloudaudit/ [accessed 13.03.2013]. [6] “Cloud Control Matrix (CCM): Cloud Security Alliance,” https://cloudsecurityalliance.org/research/ ccm/ [accessed 13.03.2013]. [7] “COBIT-IT Governance Framework - Information Assurance Control — ISACA,” http://www.isaca.org/Knowledge- Center/cobit/Pages/Overview.aspx [accessed 19.09.2012]. [8] “Understanding Health Information Privacy,” http://www.hhs.gov/ocr/privacy/hipaa/understanding/ index.html [accessed 19.10.2012]. [9] “Official Source of PCI DSS Data Security Standards,” https://www.pcisecuritystandards.org/security standards/index.php [accessed 18.10.2012]. [10] “ISO 27001, ISO27001 Information Security Standard,” http://www.itgovernance.co.uk/iso27001.aspx [accessed 19.09.2012]. [11] “NIST.gov - Computer Security Division - Computer Security resource Center,” http://csrc.nist.gov/ publications/PubsDrafts.html [accessed 20.09.2012]. [12] “Towards Building an Automated Security Compliance Tool for the Cloud”, Ullah, K.W, Ahmed, A.S, Ylitalo, J. Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on Digital Object Identifier: 10.1109/TrustCom.2013.195 Publication Year: 2013, Page(s): 1587-1593. [13] “Testimony and Statement for the Record of Bruce Schneier”, on http://www.iwar.org.uk, 2001. [14] Security Compliance: The Next Frontier in Security Research, Klaus Julisch IBM Research Säumerstrasse 4 8803 Rüschlikon, Switzerland kju@zurich.ibm.com. [15] “Scripting JAX-WS [JavaScript]” Vinoski, S. Internet Computing, IEEE Volume: 10, Issue: 3Digital Object Identifier: 10.1109/MIC.2006.65 Publication Year: 2006, Page(s): 91-94. [16] “Construction Methodology for a Remote Ultrasound Diagnostic System”, Koizumi, N, 2009 Robotics, IEEE Transactions on (Volume:25, Issue: 3 ). [17] “Mashup service release based on SOAP and REST”, Huijie Su ; Bo Cheng ; Tong Wu ; Xiaofeng Li Computer Science and Network Technology (ICCSNT), 2011 International Conference on Volume:2 Digital Object Identifier:10.1109/ICCSNT.2011.6182150, Publication Year: 2011, Page(s): 1091-1095. [18] “Modeling the performance of HTTP over several transport protocols”, Heidemann, J, Obraczka, K. ; Touch, J.Networking, IEEE/ACM Transactions on Volume:5, Digital Object Identifier: 10.1109/90.649564, Publication Year: 1997 , Page(s):616-630. [19] "Perl: not just for Web programming",Dominus, M.-J. Software, IEEE Volume:15, Digital Object Identifier: 10.1109/52.646885, Publication Year: 1998, Page(s): 69-74. [20] "Parallel Speculative Dom-based XML Parser", Ma Jianliang ; Shaobin Zhang ; Tongsen Hu ; Minghui Wu ; Tianzhou Chen, High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), 2012 IEEE 14th International Conference on Digital Object Identifier: 10.1109/HPCC.2012.15, Publication Year: 2012, Page(s): 33-40. [21] "The Application and Analysis of Netconf Subtree Filtering Based on SAX and DOM", Yazhou Xiang ; Bin Zhang ; Guohui Li ; Yan Li ; Xuesong Gao, 2010 International Conference on Volume: 3,Digital Object Identifier: 10.1109/ICMTMA.2010.562, Publication Year:2010, Page(s):758-761. [22] “Data Security in the World of Cloud Computing”, Kaufman, L.M. Security & Privacy, IEEE, Issue: 4, Publication Year: 2009, Page(s): 61-64. [23] “Guidelines on security and privacy in public cloud computing,” W. Jansen and T. Grance, Special Report 800-144, National Institutes of Standards and Technology (NIST), Gaithersburg, MD, January 2011.