An optimized approach to protect virtual machine image integrity in cloud computing

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The development of cloud computing is surely unprecedented in IT industry with many companies adapting to this new technology. The related companies undoubtedly benefit a lot from cloud computing. Meanwhile, the security of cloud platforms becomes one of the concerns for companies. As an important underlying component, the virtual machine image is also in need of especial protection. In this paper, we propose an optimized approach to protect the virtual machine image integrity. In the approach, we propose an architecture of integrity protection, optimize a hardware environment as the fundamental deployment environment, design a measurement module to measure and verify images, and design a strategy module to handle the results. Finally, we integrate it with OpenStack and evaluate its security and performance. The experiments demonstrate that our approach can protect the image integrity well and the measurement speed is increased three times faster than the ordinary approach with a little more resource consumption.

Original languageEnglish
Title of host publicationProceedings - 2016 7th International Conference on Cloud Computing and Big Data, CCBD 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages75-80
Number of pages6
ISBN (Electronic)9781509035557
DOIs
StatePublished - 13 Jul 2017
Event7th International Conference on Cloud Computing and Big Data, CCBD 2016 - Taipa, Macau, China
Duration: 16 Nov 201618 Nov 2016

Publication series

NameProceedings - 2016 7th International Conference on Cloud Computing and Big Data, CCBD 2016

Conference

Conference7th International Conference on Cloud Computing and Big Data, CCBD 2016
Country/TerritoryChina
CityTaipa, Macau
Period16/11/1618/11/16

Keywords

  • Cloud Computing Security
  • Image Integrity
  • Image Protection
  • OpenStack

Fingerprint

Dive into the research topics of 'An optimized approach to protect virtual machine image integrity in cloud computing'. Together they form a unique fingerprint.

Cite this