A new secure proxy-based distributed virtual machines management in mobile cloud computing

The mobile cloud computing as an excellent paradigm offers on-demand services, whereas users can be confident once using them. Nevertheless, the existing cloud virtualization systems are not secure enough regarding the mediocre degree of data protection, which avoids individuals and organizations t...

Full description

Saved in:
Bibliographic Details
Main Authors: Annane, Boubakeur, Ghazali, Osman, Alti, Adel
Format: Article
Language:English
Published: 2019
Subjects:
Online Access:http://repo.uum.edu.my/26451/1/IJACR%209%2043%202019%20222%20231.pdf
http://repo.uum.edu.my/26451/
http://doi.org/10.19101/IJACR.PID10
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Utara Malaysia
Language: English
id my.uum.repo.26451
record_format eprints
spelling my.uum.repo.264512019-09-26T01:03:32Z http://repo.uum.edu.my/26451/ A new secure proxy-based distributed virtual machines management in mobile cloud computing Annane, Boubakeur Ghazali, Osman Alti, Adel QA75 Electronic computers. Computer science The mobile cloud computing as an excellent paradigm offers on-demand services, whereas users can be confident once using them. Nevertheless, the existing cloud virtualization systems are not secure enough regarding the mediocre degree of data protection, which avoids individuals and organizations to engage with this technology. Therefore, the security of sensitive data may be affected when mobile users move it out to the cloud exactly during the processing in virtual machines (VMs). Many studies show that sensitive data of legitimate users’ VMs may be the target of malicious users, which lead to violating VMs’ confidentiality and privacy. The current approaches offer various solutions for this security issue. However, they are suffering from many inconveniences such as unauthorized distributed VM access behavior and robust strategies that ensure strong protection of communication of sensitive data among distributed VMs. The purpose of this paper is to present a new security proxy-based approach that contains three policies based on secured hashed DiffieHellman keys for user access control and VM deployment and communication control management in order to defend against three well-known attacks on the mobile cloud environment (co-resident attacks, hypervisor attacks and distributed attacks). The related attacks lead to unauthorized access to sensitive data between different distributed mobile applications while using the cloud as a third party for sharing resources. The proposed approach is illustrated using a healthcare case study. Including the experimental results that show interesting high-efficiency protection and accurate attacks identification. 2019 Article PeerReviewed application/pdf en http://repo.uum.edu.my/26451/1/IJACR%209%2043%202019%20222%20231.pdf Annane, Boubakeur and Ghazali, Osman and Alti, Adel (2019) A new secure proxy-based distributed virtual machines management in mobile cloud computing. International Journal of Advanced Computer Research, 9 (43). pp. 222-231. ISSN 22497277 http://doi.org/10.19101/IJACR.PID10 doi:10.19101/IJACR.PID10
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutionali Repository
url_provider http://repo.uum.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Annane, Boubakeur
Ghazali, Osman
Alti, Adel
A new secure proxy-based distributed virtual machines management in mobile cloud computing
description The mobile cloud computing as an excellent paradigm offers on-demand services, whereas users can be confident once using them. Nevertheless, the existing cloud virtualization systems are not secure enough regarding the mediocre degree of data protection, which avoids individuals and organizations to engage with this technology. Therefore, the security of sensitive data may be affected when mobile users move it out to the cloud exactly during the processing in virtual machines (VMs). Many studies show that sensitive data of legitimate users’ VMs may be the target of malicious users, which lead to violating VMs’ confidentiality and privacy. The current approaches offer various solutions for this security issue. However, they are suffering from many inconveniences such as unauthorized distributed VM access behavior and robust strategies that ensure strong protection of communication of sensitive data among distributed VMs. The purpose of this paper is to present a new security proxy-based approach that contains three policies based on secured hashed DiffieHellman keys for user access control and VM deployment and communication control management in order to defend against three well-known attacks on the mobile cloud environment (co-resident attacks, hypervisor attacks and distributed attacks). The related attacks lead to unauthorized access to sensitive data between different distributed mobile applications while using the cloud as a third party for sharing resources. The proposed approach is illustrated using a healthcare case study. Including the experimental results that show interesting high-efficiency protection and accurate attacks identification.
format Article
author Annane, Boubakeur
Ghazali, Osman
Alti, Adel
author_facet Annane, Boubakeur
Ghazali, Osman
Alti, Adel
author_sort Annane, Boubakeur
title A new secure proxy-based distributed virtual machines management in mobile cloud computing
title_short A new secure proxy-based distributed virtual machines management in mobile cloud computing
title_full A new secure proxy-based distributed virtual machines management in mobile cloud computing
title_fullStr A new secure proxy-based distributed virtual machines management in mobile cloud computing
title_full_unstemmed A new secure proxy-based distributed virtual machines management in mobile cloud computing
title_sort new secure proxy-based distributed virtual machines management in mobile cloud computing
publishDate 2019
url http://repo.uum.edu.my/26451/1/IJACR%209%2043%202019%20222%20231.pdf
http://repo.uum.edu.my/26451/
http://doi.org/10.19101/IJACR.PID10
_version_ 1646016556566577152