Basit öğe kaydını göster

dc.contributor.authorOktay, Ucman
dc.contributor.authorAydin, Muhammed Ali
dc.contributor.authorSahingoz, Ozgur Koray
dc.date.accessioned2021-03-06T09:15:01Z
dc.date.available2021-03-06T09:15:01Z
dc.identifier.citationOktay U., Aydin M. A. , Sahingoz O. K. , "Circular Chain VM Protection in AdjointVM", International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), Konya, Türkiye, 9 - 11 Mayıs 2013, ss.93-97
dc.identifier.othervv_1032021
dc.identifier.otherav_e4c674db-c894-4e6b-8854-a5e32cfbf047
dc.identifier.urihttp://hdl.handle.net/20.500.12627/150531
dc.identifier.urihttps://doi.org/10.1109/taeece.2013.6557202
dc.description.abstractCloud computing is a demanding subject and its fans are increasing day by day in the private or corporate areas. Confidentiality is the most important point of information security with respect to integrity and availability in cloud computing especially in financial, governmental and military usage. An Intrusion Detection System (IDS) service increases the cloud's security level. In this paper, a hybrid approach is introduced that can be used in cloud computing to protect cloud users from the untrusted cloud providers or untrusted employees in a circular chain protection model. This model is proposed over an existing model, AdjointVM, which uses three types of technologies (trusted computing, host-based IDS, virtual machine monitor based IDS) to tackle external and internal threats in cloud systems. The proposed model claims to overcome one of the weakest points of AdjointVM model, and aims to build a more secure cloud environment for the users by adding additional security mechanism between VMs. In the proposed model, responsibility of confidentiality is not giving up only to the providers or cloud administrators, a VM can protect another VM in a circular manner and this results a chain structure and constructs a circular structure to enhance global security of the system. At the same time, users can also manage and monitor their own confidentiality by themselves.
dc.language.isoeng
dc.subjectSinyal İşleme
dc.subjectBilgisayar Bilimleri
dc.subjectBiyoenformatik
dc.subjectMühendislik ve Teknoloji
dc.subjectMühendislik
dc.subjectBilgi Sistemleri, Haberleşme ve Kontrol Mühendisliği
dc.subjectMÜHENDİSLİK, ELEKTRİK VE ELEKTRONİK
dc.subjectMühendislik, Bilişim ve Teknoloji (ENG)
dc.subjectBilgisayar Bilimi
dc.subjectBİLGİSAYAR BİLİMİ, TEORİ VE YÖNTEM
dc.titleCircular Chain VM Protection in AdjointVM
dc.typeBildiri
dc.contributor.departmentTurkish Air Force , ,
dc.contributor.firstauthorID141073


Bu öğenin dosyaları:

DosyalarBoyutBiçimGöster

Bu öğe ile ilişkili dosya yok.

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster