Title | An authorized security middleware for managing on demand infrastructure in cloud |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Manishankar, S., Arjun, C. S., Kumar, P. R. A. |
Conference Name | 2017 International Conference on Intelligent Computing and Control (I2C2) |
Keywords | Authorization, authorized security middleware, Auto scalability, auto scalability feature, cloud computing, cloud demand infrastructure management, cloud stack, cloud users, Collaboration, composability, Dual authorization, Dual-Authorization, Dynamic infrastructure request control, handle On-demand Infrastructure request, Heuristic algorithms, IaaS, middleware, middleware security, on-demand request, on-demand scheduler, On-demand security, on-demand service request handling, policy, policy-based governance, pubcrawl, rapid elasticity, resilience, Resiliency, Scalability, secure environment, security issues, security of data, security risks, Servers, Tools, ubiquitous computing, ubiquitous network access, virtualisation, virtualized computing platform, VM |
Abstract | Recent increases in the field of infrastructure has led to the emerging of cloud computing a virtualized computing platform. This technology provides a lot of pros like rapid elasticity, ubiquitous network access and on-demand access etc. Compare to other technologies cloud computing provides many essential services. As the elasticity and scalability increases the chance for vulnerability of the system is also high. There are many known and unknown security risks and challenges present in this environment. In this research an environment is proposed which can handle security issues and deploys various security levels. The system handles the security of various infrastructure like VM and also handles the Dynamic infrastructure request control. One of the key feature of proposed approach is Dual authorization in which all account related data will be authorized by two privileged administrators of the cloud. The auto scalability feature of the cloud is be made secure for on-demand service request handling by providing an on-demand scheduler who will process the on-demand request and assign the required infrastructure. Combining these two approaches provides a secure environment for cloud users as well as handle On-demand Infrastructure request. |
DOI | 10.1109/I2C2.2017.8321827 |
Citation Key | manishankar_authorized_2017 |