Inter-Agent Coordinated Security Model for Cloud Based Virtual Machines (Record no. 9719)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | a |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20191016093848.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 191016b xxu||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | AIKTC-KRRC |
| Transcribing agency | AIKTC-KRRC |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 9874 |
| Author | Onuoha, E. C. |
| 245 ## - TITLE STATEMENT | |
| Title | Inter-Agent Coordinated Security Model for Cloud Based Virtual Machines |
| 250 ## - EDITION STATEMENT | |
| Volume, Issue number | Vol.5(2), Jul-Dec |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Tamil Nadu |
| Name of publisher, distributor, etc. | i-manager's |
| Year | 2018 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Pagination | 11-19p. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | For a user who desires to utilize the services of the cloud, security is not negotiable. Cloud Service Providers (CSPs) have security features that help protect user's data and information. These features are however not comprehensive. The Service Level Agreement (SLA) of most CSPs have certain exclusions that warrant users to undertake some measures of security upon themselves, especially for tenants having Virtual Machines (VM) in a multi-tenant architecture. This means that users who are ignorant of the security implications might be exposed to great risks. This paper presents a security model that used the OPNET (Optimized Network Engineering Tools) modeler, based on distributed agents, to prevent attacks from rogue virtual machine and enhance security of VM-to-VM communication. A set of mobile devices were given varying levels of access and pitched against some servers. Observing the packet network delays, phase response time for security apps and the coordination between these mobile devices and the installed agents on the servers showed that data belonging to tenants are safer and attacks from virtual machines are almost negligible. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| 9 (RLIN) | 4622 |
| Topical term or geographic name entry element | Computer Engineering |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 9875 |
| Co-Author | Akomolafe, O. P. |
| 773 0# - HOST ITEM ENTRY | |
| Place, publisher, and date of publication | Nagercoil i-manager Publication |
| International Standard Serial Number | 2349-6835 |
| Title | i-manager's journal on cloud computing (JCC) |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| URL | https://www.imanagerpublications.com/article/15688/23 |
| Link text | Click here |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Articles Abstract Database |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | School of Engineering & Technology | School of Engineering & Technology | Archieval Section | 16/10/2019 | 2019880 | 16/10/2019 | 16/10/2019 | Articles Abstract Database |