CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Ensuing Security in a Proposed Tertiary Institution Cloud Computing Environment: Introducing a NoHype Framework to the Private Cloud as a Way of Securing the IaaS Model

by Shaquille Martey, Gongxuan Zhang
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 43
Year of Publication: 2020
Authors: Shaquille Martey, Gongxuan Zhang
10.5120/ijca2020919936

Shaquille Martey, Gongxuan Zhang . Ensuing Security in a Proposed Tertiary Institution Cloud Computing Environment: Introducing a NoHype Framework to the Private Cloud as a Way of Securing the IaaS Model. International Journal of Computer Applications. 177, 43 ( Mar 2020), 10-16. DOI=10.5120/ijca2020919936

@article{ 10.5120/ijca2020919936,
author = { Shaquille Martey, Gongxuan Zhang },
title = { Ensuing Security in a Proposed Tertiary Institution Cloud Computing Environment: Introducing a NoHype Framework to the Private Cloud as a Way of Securing the IaaS Model },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2020 },
volume = { 177 },
number = { 43 },
month = { Mar },
year = { 2020 },
issn = { 0975-8887 },
pages = { 10-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number43/31191-2020919936/ },
doi = { 10.5120/ijca2020919936 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:48:30.901903+05:30
%A Shaquille Martey
%A Gongxuan Zhang
%T Ensuing Security in a Proposed Tertiary Institution Cloud Computing Environment: Introducing a NoHype Framework to the Private Cloud as a Way of Securing the IaaS Model
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 43
%P 10-16
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing has reduced the large capital outlays for hardware storage and the human expense needed for its operation. As more institutions and organizations read and write (upload and download private data remotely on computer networks through an Internet connection, eliminating the need for local computer storage, data encryption from unauthorized access (intrusive hackers) becomes a priority. Tertiary institutions need for storage is a wide one, so the need for storing of data in the cloud arises simplifying data management and easing the workflow and pipeline of the staff, non-staff and students. The paper explores various research efforts, reviewed to introduce cloud to Tertiary institutions and employable methods for addressing the biggest fear of cloud adoption in educational organizations. This paper focuses on the security of data stored on the private cloud environment for tertiary institutions, proposing a security architecture for its infrastructure to employ for the satisfaction of such needs. For the purpose of this paper, the security of the private cloud is discussed with more focus on the Virtualization Infrastructure as a Service. This adopted security Architecture is integrated into the Proposed Tertiary Institution Cloud Computing Environment and ready for testing.

References
  1. Worldwide Public Cloud Services Spending Forecast to Reach $160 Billion This Year, According to IDC. (2018, September 27). Retrieved 28 May 2019.
  2. Aloraini, Afnan & Hammoudeh, Mohammad. (2017). A Survey on Data Confidentiality and Privacy in Cloud Computing. 1-7. 10.1145/3102304.3102314.
  3. Goertzel, Karen & Booz, Ciacssp & Hamilton, Allen. (2008). Enhancing the Development Life Cycle to Produce Secure Software. Retrieved 28 May 2019 from https://www.researchgate.net/publication/228704603_Enhancing_the_Development_Life_Cycle_to_Produce_Secure_Software
  4. McCarthy, J., “Centennial Keynote Address,” MIT, 1961.
  5. Popovic, Kresimir & Hocenski, Zeljko. (2010). Cloud computing security issues and challenges. 344 - 349.
  6. Larry Dignan. (2019). Top cloud providers 2019: AWS, Microsoft Azure, Google Cloud; IBM makes hybrid move; Salesforce dominates SaaS. Retrieved 24th May 2019 from https://www.zdnet.com/ article/top-cloud-providers-2019-aws-microsoft-azure-google-cloud- ibm-makes-hybrid-movesalesforce-dominates-saas/
  7. Red Hat Inc. (n.d.). What is different about cloud security. Retrieved from https://www.redhat.com/en/topics/security/cloud- security
  8. Peter Mell & Tim Grance. Effectively and Securely Using the Cloud Computing Paradigm
  9. R. Balasubramanian & M. Aramudhan. (2012). Security Issues: Public vs Private vs Hybrid Cloud Computing. International Journal of Computer Applications (0975 – 8887). Volume 55– No.13.
  10. Securing the Internet of Things: A Proposed Framework (N.D).
  11. John R. Vacca. (2017). Computer and Information Security Handbook. 931 - 936.
  12. Upguard. 2018. What Are Cloud Leaks? Retrieved 28 May 2019.
  13. Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism. (3rd ed.). Upper Saddle River, NJ:Pearson
  14. Craig Nelson & Tomer Teller. 2016. Cloud Attacks Illustrated:Insights from the cloud provider. RSA Conference 2016.
  15. B. Joshi, A. Vijayan, and B. Joshi, “Securing cloud computing environment against DDoS attacks,” in Computer Communication and Informatics (ICCCI), 2012 International Conference on, Jan. 2012, pp. 1 –5
  16. QS. 2019. Cloud Technology in Higher Education. Retrieved 28 May 2019.
  17. SARVESH KUMAR, SAURABH SRIVASTAVA, VIJAY KUMAR, OPINDER KUMAR & ASHWANEE KUMAR SINGH. 2012. Private Cloud: A Paradigm of Cloud Computing with University Shared data Center (USDC)International Journal of Computer & Communication Technology ISSN (PRINT): 0975 - 7449, Volume-3, Issue-6, 7, 8, 2012121
  18. Anwar, Md & Masud, Anwar & Yong, Jianming & Huang, Xiaodi. (2012). Cloud Computing for Higher Education: A Roadmap. 10.1109/CSCWD.2012.6221872.
  19. Alzoubaidi, A. (2016). Private Database Cloud Deployment for Multi-Campus Universities.
  20. Mircea, Marinela & Andreescu, Anca. (2010). Using Cloud Computing in Higher Education: A Strategy to Improve Agility in the Current Financial Crisis. Communications of the IBIMA. 2011. 10.5171/2011.875547.
  21. Bozzelli, T. (2009). “Will the Public Sector Cloud Deliver Value? Powering the Cloud Infrastructure,” CISCO. [Online], [Retrieved May 25,2019],http://www.cisco.com/web/strategy/ docsgov/2009_cloud_public_sector_tbozelli.
  22. Ronald L. Krutz & Russell Dean Vines. (2010). CLOUD SECURITY: A Comprehensive Guide to Secure Cloud Computing.
  23. Azeez, Nureni & van der Vyver, Charles. (2018). Security and privacy issues in e-health cloud-based system: A comprehensive content analysis. Egyptian Informatics Journal. 10.1016/ j.eij.2018.12.001.
  24. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. of CCS’06, 2006.
  25. Almorsy, Mohamed & Grundy, John & Ibrahim, Amani. (2012). TOSSMA: a tenant-oriented SaaS security management architecture. 10.1109/CLOUD.2012.146.
  26. Dawoud, Wesam & Takouna, Ibrahim & Meinel, C. (2010). Infrastructure as a service security: Challenges and solutions. 1 - 8.
  27. Szefer, Jakub & Keller, Eric & Lee, Ruby & Rexford, Jennifer. (2011). Eliminating the hypervisor attack surface for a more secure cloud. 401-412. 10.1145/2046707.2046754.
  28. Wensheng, Zhang & Cico, Betim & Meşecan, İbrahim. (2018). Survey on Hypervisor Security: Challenges and Solutions.
  29. http://www.cs.ucc.ie/~gavin/cs1001/Notes/chap01/ ch01_7.html
  30. Intel 64 and IA-32 Architectures Software Developer’s Manual Volume 3B: System Programming Guide, Part 2. http://ww.intel.com/ products/processor/manuals/.
  31. Z. Wang and R. B. Lee, “New cache designs for thwarting software cache-based side channel attacks,” in 34th International Symposium on Computer Architecture (ISCA), pp. 494 – 505, 2007.
  32. Keller, Eric & Szefer, Jakub & Rexford, Jennifer & Lee, Ruby. (2010). NoHype: virtualized cloud infrastructure without the virtualization. ACM SIGARCH Computer Architecture News. 38. 350-361. 10.1145/1815961.1816010.
  33. D. J. Bernstein, “Cache-timing attacks on AES,” in University of Illinois at Chicago Tech Report, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing IaaS Hypervisor Architecture Framework Virtualization