- Cyber Security Challenges and Opportunities in the Context of Pakistan - 2015-03-04
- Papers presented in ICOSST held at UET Lahore - 2014-12-18
- A Journal Paper Accepted in The computer Journal, Oxford Journals - 2014-12-08
- SpringerOpen journal Paper published - 2014-11-11
- NUST Intra Research Conference - 2014-11-08
Virtual Machines image protection in Cloud Computing
In Cloud computing, virtualization is the basis of providing IaaS that separates data, network, applications and machines from physical constraints. Virtualization has become a common way for users to optimize their hardware utilization by maximizing the number and kinds of jobs a single CPU can handle. It enables enterprise users and IT developers to have a unified physical platform whilst running on it multiple different operating systems and multiple applications. Although different virtualization approaches exist but for server virtualization in large computing systems, bare metal virtualization approach is used.
As enterprises continue to embrace this technology in order to take full advantage of the set of benefits it offers, they often overlook an important area like security. Organizations now face the challenge of securing virtualized systems, which are vulnerable to the same threats as physical systems. In particular, virtual machines (VMs) are vulnerable to many attacks, such as attacker accessing host disk files through his malicious virtual machine, creating rogue virtual machines using disk images to occupy system resources and launch a DOS attack at Cloud. Furthermore, user data on images might be accessible to unauthorized person with physical access to Cloud system. This project is based on designing a system that addresses the attacks launched on VM disk images stored in Cloud. To provide security to the VM images they will be kept encrypted in their unused state. The implementation of the project will be done on a open source Cloud computing platform.
The major goals of the project are:
- To ensure the integrity of disk images in the stored state.
- To provide confidentiality to customer data stored in the disk images.
- To ensure that the integrity and confidentiality of disk images is maintained even if the Cloud infrastructure is compromised.
- Protecting the data stored on disk images from unauthorized access by Cloud admin or anyone with physical access to the system.
► "Securing the virtual Machine Images in Cloud Computing" (Link)
► "Security Aspects of Virtualization in Cloud Computing" (Link)