• Mi Re-Unir
    Búsqueda Avanzada
    JavaScript is disabled for your browser. Some features of this site may not work without it.
    Ver ítem 
    •   Inicio
    • UNIR REVISTAS
    • Revista IJIMAI
    • 2017
    • vol. 4, nº 3, march 2017
    • Ver ítem
    •   Inicio
    • UNIR REVISTAS
    • Revista IJIMAI
    • 2017
    • vol. 4, nº 3, march 2017
    • Ver ítem

    Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment

    Autor: 
    Toumi, Hicham
    ;
    Marzak, Bouchra
    ;
    Talea, Amal
    ;
    Eddaoui, Ahmed
    ;
    Talea, Mohamed
    Fecha: 
    03/2017
    Palabra clave: 
    security; agents; cloud computing; IJIMAI
    Tipo de Ítem: 
    article
    URI: 
    https://reunir.unir.net/handle/123456789/11734
    DOI: 
    http://doi.org/10.9781/ijimai.2017.4311
    Dirección web: 
    https://ijimai.org/journal/bibcite/reference/2570
    Open Access
    Resumen:
    Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. Cloud Computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, with the enormous use of Cloud, the probability of occurring intrusion also increases. There is a major need of bringing security, transparency and reliability in cloud model for client satisfaction. One of the security issues is how to reduce the impact of any type of intrusion in this environment. To address this issue, a security solution is proposed in this paper. We provide a collaborative framework between our Hybrid Intrusion Detection System (Hy-IDS) based on Mobile Agents and virtual firewalls. Therefore, our hybrid intrusion detection system consists of three types of IDS namely IDS-C, IDS-Cr and IDS-M, which are dispatched over three layer of cloud computing. In the first layer, we use IDS-C over our framework to collect, analyze and detect malicious data using Mobile Agents. In case of attack, we collect at the level of the second layer all the malicious data detected in the first layer for the generation of new signatures using IDS-Cr, which is based on a Signature Generation Algorithm (SGA) and network intrusion detection system (NIDS). Finally, through an IDS-M placed in the third layer, the new signatures will be used to update the database NIDS belonging to IDS-Cr, then the database to NIDS belonging of IDS-Cr the cluster neighboring and also their IDS-C. Hardware firewall is unable to control communication between virtual machines on the same hypervisor. Moreover, they are blind to virtual traffic. Mostly, they are deployed at Virtual Machine Monitor- level (VMM) under Cloud provider’s control. Equally, the mobile agents play an important role in this collaboration. They are used in our framework for investigation of hosts, transfer data malicious and transfer update of a database of neighboring IDS in the cloud. With this technique, the neighboring IDS will use these new signatures to protect their area of control against the same type of attack. By this type of close-loop control, the collaborative network security management framework can identify and address new distributed attacks more quickly and effectively.
    Mostrar el registro completo del ítem
    Ficheros en el ítem
    icon
    Nombre: ijimai20174_3_11_pdf_15245.pdf
    Tamaño: 568.6Kb
    Formato: application/pdf
    Ver/Abrir
    Este ítem aparece en la(s) siguiente(s) colección(es)
    • vol. 4, nº 3, march 2017

    Estadísticas de uso

    Año
    2012
    2013
    2014
    2015
    2016
    2017
    2018
    2019
    2020
    2021
    2022
    Vistas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    23
    19
    Descargas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    9
    18

    Ítems relacionados

    Mostrando ítems relacionados por Título, autor o materia.

    • Accessibility within open educational resources and practices for disabled learners: a systematic literature review 

      Zhang, Xiangling; Tlili, Ahmed; Nascimbeni, Fabio (1); Burgos, Daniel (1); Huang, Ronghuai; Chang, Ting-Wen; Jemni, Mohamed; Khribi, Mohamed Koutheaïr (Smart Learning Environments, 12/2020)
      The number of disabled students is rapidly increasing worldwide, but many schools and universities have failed to keep up with their learning needs. Consequently, large numbers of disabled students are dropping out of ...
    • The Evolution of Educational Game Designs From Computers to Mobile Devices: A Comprehensive Review 

      Tlili, Ahmed; Essalmi, Fathi; Jemni, Mohamed; Kinshuk; Chen, Nian-Shing; Huang, Ronghuai; Burgos, Daniel (1) (Lecture Notes in Educational Technology, 2020)
      With the rapid growth of mobile technologies, mobile devices have become very popular and have reached a very high spread. Consequently, mobile games have started gaining an increasing attention from researchers and ...
    • Remote Special Education During Crisis: COVID-19 as a Case Study 

      Tlili, Ahmed; Amelina, Natalia; Burgos, Daniel (1); Othman, Achraf; Huang, Ronghuai; Jemni, Mohamed; Lazor, Jemni; Zhang, Xiangling; Chang, Ting-Wen (Lecture Notes in Educational Technology, 2021)
      Due to the COVID-19 pandemic, face-to-face teaching was banned, and more than one billion students did not return to school. While both teachers and students found themselves in a very challenging situation as they both ...

    Mi cuenta

    AccederRegistrar

    ¿necesitas ayuda?

    Manual de UsuarioAutorización TFG-M

    Listar

    todo Re-UnirComunidades y coleccionesPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de accesoEsta colecciónPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de acceso






    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja
     
    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja