Data Security Risk Mitigation in the Cloud Through Virtual Machine Monitoring

Ashritha Jonnala, Rajesh Ampani, Danish Faraz Abbasi, Abeer Alsadoon, P. W.C. Prasad

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

1 Citation (Scopus)

Abstract

Cloud computing offers on demand, pay per use, and remote access to shared pool of resources, because of which several organizations are moving towards cloud. With increased adoption of cloud computing by number of organizations, data security and privacy concerns in cloud have also become increasingly prominent. It is important to maintain data security in the cloud to avoid any kind of data breaches. However, the problem of identifying the optimal solution for data security in cloud environment is very challenging because of various security and performance constraints. The aim of this paper is to emphasize the importance of data security in cloud computing by analyzing various data security techniques. The paper proposes a taxonomy of authentication, verification, and mitigation in multi-agent system cloud monitoring for data security risk mitigation in cloud computing environment. The authentication process will include node authentication, mutual authentication, data authentication and wireless sensor network (WSN) authentication. Verification will be based on the use of digital certificates and access control implementation. Mitigation will involve single sign on solution and live migration approach. The contribution of this work into the wide research area of data security in cloud computing is demonstrating various tools and techniques for data security risk mitigation. We verify the utility of the authentication, verification, and mitigation taxonomy by analyzing 15 research journals. This study will provide a comprehensive insight into already existing techniques for data security risk mitigation in cloud computing.
Original languageEnglish
Title of host publicationInnovative Technologies in Intelligent Systems and Industrial Applications - CITISIA 2022
EditorsSubhas Chandra Mukhopadhyay, S.M. Namal Arosha Senanayake, P.W. Chandana Withana
PublisherSpringer Science and Business Media Deutschland GmbH
Pages227-238
Number of pages12
ISBN (Print)9783031290770
DOIs
Publication statusPublished - 2023
EventInternational Conference on Innovative Technologies in Intelligent Systems and Industrial Applications, CITISIA 2022 - Sydney, Australia
Duration: 14 Nov 202216 Nov 2022

Publication series

NameLecture Notes in Electrical Engineering
Volume1029 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

ConferenceInternational Conference on Innovative Technologies in Intelligent Systems and Industrial Applications, CITISIA 2022
Country/TerritoryAustralia
CitySydney
Period14/11/2216/11/22

Bibliographical note

Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023.

Keywords

  • Authentication
  • Mitigation
  • Verification
  • VM (virtual machine)

Fingerprint

Dive into the research topics of 'Data Security Risk Mitigation in the Cloud Through Virtual Machine Monitoring'. Together they form a unique fingerprint.

Cite this