Evaluation of mechanisms that enable self- protection on policy violation in cloud Infrastructure
View/ Open
Date
2018-10-14Author
Oginga, Ruth Anyango
Musau, Felix
Maghanga, Christopher
Metadata
Show full item recordAbstract
Cloud computing is an emerging paradigm that involves all the basic components of computing
such as end-user machines (PCs), communication networks, access management systems and
cloud infrastructures. According to Gartner, while the hype grew exponentially during 2008 and
continued since, it is clear that there is a major shift towards the cloud computing model and that
the benefits may be substantial (Gartner Hype-Cycle, 2012). However, as the shape of the cloud
computing is emerging and developing rapidly both theoretically and in reality, the cloud
security, data and cloud infrastructure and privacy issues still pose significant challenges. It still
lacks mechanism to enable itself from policy violation.In this work, we describe various
mechanisms that would enable self-protection on policy violation in cloud infrastructure. In
particular, we discuss five critical mechanisms: IDS, Cyberoam, Federated Identity Management
System, firewall and honeypot. Some solutions to mitigate these attacks on these mechanisms are
also proposed along with a brief presentation on the future trends in cloud
computingdeployment. Finally we evaluate these mechanisms based on the data collected from
users in case they know how to protect their data in cloud environment.