Data security risk mitigation in the cloud through virtual machine monitoring

Ashritha Jonnala, Rajesh Ampani, Danish Faraz Abbasi, Abeer Alsadoon, P. W.C. Prasad

Research output: Book chapter/Published conference paperConference paperpeer-review

Abstract

Cloud computing offers on demand, pay per use, and remote access to shared pool of resources, because of which several organizations are moving towards cloud. With increased adoption of cloud computing by number of organizations, data security and privacy concerns in cloud have also become increasingly prominent. It is important to maintain data security in the cloud to avoid any kind of data breaches. However, the problem of identifying the optimal solution for data security in cloud environment is very challenging because of various security and performance constraints. The aim of this paper is to emphasize the importance of data security in cloud computing by analyzing various data security techniques. The paper proposes a taxonomy of authentication, verification, and mitigation in multi-agent system cloud monitoring for data security risk mitigation in cloud computing environment. The authentication process will include node authentication, mutual authentication, data authentication and wireless sensor network (WSN) authentication. Verification will be based on the use of digital certificates and access control implementation. Mitigation will involve single sign on solution and live migration approach. The contribution of this work into the wide research area of data security in cloud computing is demonstrating various tools and techniques for data security risk mitigation. We verify the utility of the authentication, verification, and mitigation taxonomy by analyzing 15 research journals. This study will provide a comprehensive insight into already existing techniques for data security risk mitigation in cloud computing.

Original languageEnglish
Title of host publicationInnovative Technologies in Intelligent Systems and Industrial Applications
Subtitle of host publicationCITISIA 2022
EditorsSubhas Chandra Mukhopadhyay, S.M. Namal Arosha Senanayake, P.W. Chandana Withana
Place of PublicationCham, Switzerland
PublisherSpringer
Pages227-238
Number of pages12
ISBN (Electronic)9783031290787
ISBN (Print)9783031290770, 9783031290800
DOIs
Publication statusPublished - 2023
Event7th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications, (CITISIA) - Virtual, Sydney, Australia
Duration: 14 Nov 202216 Nov 2022
https://web.archive.org/web/20220723035937/https://www.citisia.org/ (Conference website)
https://link.springer.com/book/10.1007/978-3-031-29078-7?page=1#toc (Proceedings)

Publication series

NameLecture Notes in Electrical Engineering
Volume1029 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference7th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications, (CITISIA)
Country/TerritoryAustralia
CitySydney
Period14/11/2216/11/22
OtherThe “Conference on Innovative Technologies in Intelligent Systems & Industrial Applications” (CITISIA) is a conference that aims to provide researchers and industry experts with a platform for presenting their innovative projects and products. It is also a measure of recognition of academics’ professional and technical achievements – by industries and international organizations. This conference is designed to facilitate exchanges of ideas through communication, networking and learning from others, academics and young researchers in terms of greater collaboration.
The conference provides a unique platform for industry professionals and researchers to share their experiences and insights through their latest research and to promote research and development activities among researchers. CITISIA 2022 provides an international forum for those actively involved in research to report on the latest innovations and developments, summarize state-of-the-art works, and share ideas and advances from all aspects of engineering, where advances play an increasing role in providing enriching experiences and improving the quality of lives.
Internet address

Fingerprint

Dive into the research topics of 'Data security risk mitigation in the cloud through virtual machine monitoring'. Together they form a unique fingerprint.

Cite this