logo

Data Security Risk Mitigation in the Cloud through Virtual Machine Monitoring: A Literature Review

   

Added on  2024-06-28

85 Pages8688 Words398 Views
 | 
 | 
 | 
Literature Review (Secondary Research)
Student Name& CSU ID
Project Topic Title Data Security risk mitigation in the cloud through virtual machine monitoring
1
Data Security Risk Mitigation in the Cloud through Virtual Machine Monitoring: A Literature Review_1

Version 1.0 _ Week 1 (5 Journal Papers from CSU Library)
1
Reference in APA format that will be in
'Reference List'
Subramanian, N. and Jeyaraj, A. (2018), Data Security Challenges in Cloud through Virtual Machine
Monitoring. Computers and Electrical Engineering, 28-42.
The citation that will be in the content (Subramanian and Jeyaraj, 2018)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https://ac-els-cdn-
com.ezproxy.csu.edu.au/
S0045790617320724/1-s2.0-
S0045790617320724-main.pdf?
_tid=5c56b459-7731-4e99-8036-
a22be22ddb5b&acdnat=1532239680_7d49
b958159dbc0c7c8bc648d39436b2
Level of Journal-Q1 Security challenges
Cloud computing
Crypto-cloud
Issues in cloud
Virtualization
The Name of the Current Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution &
What is the Problem that needs to be solved
What are the components of it?
Technique/Algorithm name:
Firewalls
Host-Based Antivirus Software
Intrusion Detection System
Advanced Cloud protection system
Virtual Machine Introspection
(VMI)
Problem:
The main issues faced by the author are
security network based challenges is the
service layers of the Cloud Computing. This
defined basic service model creates security
Challenges to provide web services.
Data linear
Data Leakage
Physical Layer
Virtual Machine Monitor(VMM)
Virtual Networking
Networking Virtualization
2
Data Security Risk Mitigation in the Cloud through Virtual Machine Monitoring: A Literature Review_2

CP-ABE
IBE
Sec Cloud technique
Tools:
Ciphertext-PolicyAttribute-Based
Encryption-CPABE
Identity-Based Encryption- IBE
Applied Area:
Security in Cloud Computing
Goal:
To achieve the security Modals for the Cloud
Computing to improve the efficiency and
scalability of the systems to protect the data
from the software attack.
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Upload Encrypted Files:
Upload the files to investigate the several
security challenges of the adequate visualization.
Heath monitoring over the data. Hidden Field Manipulation
Google hacking
2 Request Files:
The techniques like firewall and instruction
detection will relate the systems of the
composition characters of the token and
Credential.
Protection from attacks N/A
3 Generate Token: Integrated of data A decrypted form of tokens
3
Data Security Risk Mitigation in the Cloud through Virtual Machine Monitoring: A Literature Review_3

The needed frameworks of any Service Level
Agreement (SLA), With this agreement which
confirms the address of relative functioning by
the Data authority.
4 Download Files:
Download the files of the Cloud infrastructures
to calculate the number of bugs to ensure the
access of files. Attacks are reverted by the
Computational process
Helps in extracting information from the cloud Security risk
5 Decrypt Files:
The entities which will occur the purpose of
related threats over which the downloaded files
will work over.
Confidential and Integrity Of Data Data Breaching is identified.
Validation Criteria (Measurement Criteria)
Dependent Variable Independent Variable
Performance High-performance network access.
Scalability Increase security at all levels
Efficiency Application level of Crypto Cloud.
4
Data Security Risk Mitigation in the Cloud through Virtual Machine Monitoring: A Literature Review_4

Input and Output Critical Thinking: Feature of this work, and
Why (Justify)
Critical Thinking: Limitations of the research
current solution, and Why (Justify)
Input (Data) Output (View)
Software-as-a-Service
Platform-as-a-
Services
Infrastructure-as-a-
Services
Hidden Field
Manipulation
CAPTCHA Breaking
The Feature of this working is to virtualize the
threats of the challenges of the cloud computing by
the VMs simultaneously by the physical host.
The limitations of the Virtual Machine Monitor
will change the constant like a memory of the
system and accuracy will there in the single and
effective method.
(Describe the research/current solution) Evaluation Criteria How this research/current solution is valuable
for your project
What is the Future work that set by the author
in the Conclusion and Future work section
Subramanian and Jeyaraj (2018), Isolated VMs
will achieve the system of any another
confirmation to include the challenges of data
securities over the performance of the system.
The techniques like firewall, with this system, will
achieve the Future work over the linear hoping of
minimal performance.
This solution of achieving the securities issues will
try to acquire with integrity address which will be
useful for the Network Level and the coverage
forms over the better attacks.
5
Data Security Risk Mitigation in the Cloud through Virtual Machine Monitoring: A Literature Review_5

Diagram/Flowchart
Figure 1: Architecture of the Crypto Cloud
6
Data Security Risk Mitigation in the Cloud through Virtual Machine Monitoring: A Literature Review_6

Fig.3 Stages of Data Recovery
7
Data Security Risk Mitigation in the Cloud through Virtual Machine Monitoring: A Literature Review_7

Fig.4 Virtual Machine Monitoring Security Challenges
2
Reference in APA format that will be in
'Reference List'
Sharma, P. K., Singh, S., & Park, J. H. (2018). OpCloudSec: Open cloud software defined wireless network
security for the Internet of Things. Computer Communications, 122, 1-8.
The citation that will be in the content Sharma, et. al. (2018)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https://www-sciencedirect-
com.ezproxy.csu.edu.au/science/article/
pii/S014036641730378X
Level of journal-Q1 Internet-of-Things
Software Defined Networking
Security
Deep learning
8
Data Security Risk Mitigation in the Cloud through Virtual Machine Monitoring: A Literature Review_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents