Inter-Agent Coordinated Security Model for Cloud Based Virtual Machines (Record no. 9719)

MARC details
000 -LEADER
fixed length control field a
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20191016093848.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 191016b xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency AIKTC-KRRC
Transcribing agency AIKTC-KRRC
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 9874
Author Onuoha, E. C.
245 ## - TITLE STATEMENT
Title Inter-Agent Coordinated Security Model for Cloud Based Virtual Machines
250 ## - EDITION STATEMENT
Volume, Issue number Vol.5(2), Jul-Dec
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Tamil Nadu
Name of publisher, distributor, etc. i-manager's
Year 2018
300 ## - PHYSICAL DESCRIPTION
Pagination 11-19p.
520 ## - SUMMARY, ETC.
Summary, etc. For a user who desires to utilize the services of the cloud, security is not negotiable. Cloud Service Providers (CSPs) have security features that help protect user's data and information. These features are however not comprehensive. The Service Level Agreement (SLA) of most CSPs have certain exclusions that warrant users to undertake some measures of security upon themselves, especially for tenants having Virtual Machines (VM) in a multi-tenant architecture. This means that users who are ignorant of the security implications might be exposed to great risks. This paper presents a security model that used the OPNET (Optimized Network Engineering Tools) modeler, based on distributed agents, to prevent attacks from rogue virtual machine and enhance security of VM-to-VM communication. A set of mobile devices were given varying levels of access and pitched against some servers. Observing the packet network delays, phase response time for security apps and the coordination between these mobile devices and the installed agents on the servers showed that data belonging to tenants are safer and attacks from virtual machines are almost negligible.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 4622
Topical term or geographic name entry element Computer Engineering
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 9875
Co-Author Akomolafe, O. P.
773 0# - HOST ITEM ENTRY
Place, publisher, and date of publication Nagercoil i-manager Publication
International Standard Serial Number 2349-6835
Title i-manager's journal on cloud computing (JCC)
856 ## - ELECTRONIC LOCATION AND ACCESS
URL https://www.imanagerpublications.com/article/15688/23
Link text Click here
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Articles Abstract Database
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     School of Engineering & Technology School of Engineering & Technology Archieval Section 16/10/2019   2019880 16/10/2019 16/10/2019 Articles Abstract Database
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.