Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment

Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. Cloud Computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platform...

Full description

Bibliographic Details
Main Authors: Hicham Toumi, Bouchra Marzak, Amal Talea, Ahmed Eddaoui, Mohamed Talea
Format: Article
Language:English
Published: Universidad Internacional de La Rioja (UNIR) 2017-03-01
Series:International Journal of Interactive Multimedia and Artificial Intelligence
Subjects:
Online Access:http://www.ijimai.org/journal/node/1350
_version_ 1811307456218791936
author Hicham Toumi
Bouchra Marzak
Amal Talea
Ahmed Eddaoui
Mohamed Talea
author_facet Hicham Toumi
Bouchra Marzak
Amal Talea
Ahmed Eddaoui
Mohamed Talea
author_sort Hicham Toumi
collection DOAJ
description Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. Cloud Computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, with the enormous use of Cloud, the probability of occurring intrusion also increases. There is a major need of bringing security, transparency and reliability in cloud model for client satisfaction. One of the security issues is how to reduce the impact of any type of intrusion in this environment. To address this issue, a security solution is proposed in this paper. We provide a collaborative framework between our Hybrid Intrusion Detection System (Hy-IDS) based on Mobile Agents and virtual firewalls. Therefore, our hybrid intrusion detection system consists of three types of IDS namely IDS-C, IDS-Cr and IDS-M, which are dispatched over three layer of cloud computing. In the first layer, we use IDS-C over our framework to collect, analyze and detect malicious data using Mobile Agents. In case of attack, we collect at the level of the second layer all the malicious data detected in the first layer for the generation of new signatures using IDS-Cr, which is based on a Signature Generation Algorithm (SGA) and network intrusion detection system (NIDS). Finally, through an IDS-M placed in the third layer, the new signatures will be used to update the database NIDS belonging to IDS-Cr, then the database to NIDS belonging of IDS-Cr the cluster neighboring and also their IDS-C. Hardware firewall is unable to control communication between virtual machines on the same hypervisor. Moreover, they are blind to virtual traffic. Mostly, they are deployed at Virtual Machine Monitor- level (VMM) under Cloud provider’s control. Equally, the mobile agents play an important role in this collaboration. They are used in our framework for investigation of hosts, transfer data malicious and transfer update of a database of neighboring IDS in the cloud. With this technique, the neighboring IDS will use these new signatures to protect their area of control against the same type of attack. By this type of close-loop control, the collaborative network security management framework can identify and address new distributed attacks more quickly and effectively.
first_indexed 2024-04-13T09:04:42Z
format Article
id doaj.art-a3029e5df6c84102b2f42fb871ab5841
institution Directory Open Access Journal
issn 1989-1660
1989-1660
language English
last_indexed 2024-04-13T09:04:42Z
publishDate 2017-03-01
publisher Universidad Internacional de La Rioja (UNIR)
record_format Article
series International Journal of Interactive Multimedia and Artificial Intelligence
spelling doaj.art-a3029e5df6c84102b2f42fb871ab58412022-12-22T02:53:02ZengUniversidad Internacional de La Rioja (UNIR)International Journal of Interactive Multimedia and Artificial Intelligence1989-16601989-16602017-03-0143707410.9781/ijimai.2017.4312ijimai.2017.4312Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud EnvironmentHicham ToumiBouchra MarzakAmal TaleaAhmed EddaouiMohamed TaleaCloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. Cloud Computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, with the enormous use of Cloud, the probability of occurring intrusion also increases. There is a major need of bringing security, transparency and reliability in cloud model for client satisfaction. One of the security issues is how to reduce the impact of any type of intrusion in this environment. To address this issue, a security solution is proposed in this paper. We provide a collaborative framework between our Hybrid Intrusion Detection System (Hy-IDS) based on Mobile Agents and virtual firewalls. Therefore, our hybrid intrusion detection system consists of three types of IDS namely IDS-C, IDS-Cr and IDS-M, which are dispatched over three layer of cloud computing. In the first layer, we use IDS-C over our framework to collect, analyze and detect malicious data using Mobile Agents. In case of attack, we collect at the level of the second layer all the malicious data detected in the first layer for the generation of new signatures using IDS-Cr, which is based on a Signature Generation Algorithm (SGA) and network intrusion detection system (NIDS). Finally, through an IDS-M placed in the third layer, the new signatures will be used to update the database NIDS belonging to IDS-Cr, then the database to NIDS belonging of IDS-Cr the cluster neighboring and also their IDS-C. Hardware firewall is unable to control communication between virtual machines on the same hypervisor. Moreover, they are blind to virtual traffic. Mostly, they are deployed at Virtual Machine Monitor- level (VMM) under Cloud provider’s control. Equally, the mobile agents play an important role in this collaboration. They are used in our framework for investigation of hosts, transfer data malicious and transfer update of a database of neighboring IDS in the cloud. With this technique, the neighboring IDS will use these new signatures to protect their area of control against the same type of attack. By this type of close-loop control, the collaborative network security management framework can identify and address new distributed attacks more quickly and effectively.http://www.ijimai.org/journal/node/1350AgentsCloud ComputingSecurity
spellingShingle Hicham Toumi
Bouchra Marzak
Amal Talea
Ahmed Eddaoui
Mohamed Talea
Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment
International Journal of Interactive Multimedia and Artificial Intelligence
Agents
Cloud Computing
Security
title Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment
title_full Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment
title_fullStr Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment
title_full_unstemmed Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment
title_short Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment
title_sort use trust management framework to achieve effective security mechanisms in cloud environment
topic Agents
Cloud Computing
Security
url http://www.ijimai.org/journal/node/1350
work_keys_str_mv AT hichamtoumi usetrustmanagementframeworktoachieveeffectivesecuritymechanismsincloudenvironment
AT bouchramarzak usetrustmanagementframeworktoachieveeffectivesecuritymechanismsincloudenvironment
AT amaltalea usetrustmanagementframeworktoachieveeffectivesecuritymechanismsincloudenvironment
AT ahmededdaoui usetrustmanagementframeworktoachieveeffectivesecuritymechanismsincloudenvironment
AT mohamedtalea usetrustmanagementframeworktoachieveeffectivesecuritymechanismsincloudenvironment