Article

Evaluation of mechanisms that enable self- protection on policy violation in cloud Infrastructure

Date
2018-10-14
Publisher
KABARAK UNIVERSITY
Type
Article
Language
en
Authors
Oginga, Ruth Anyango
Musau, Felix
Maghanga, Christopher
Overview

Abstract

Cloud computing is an emerging paradigm that involves all the basic components of computing such as end-user machines (PCs), communication networks, access management systems and cloud infrastructures. According to Gartner, while the hype grew exponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial (Gartner Hype-Cycle, 2012). However, as the shape of the cloud computing is emerging and developing rapidly both theoretically and in reality, the cloud security, data and cloud infrastructure and privacy issues still pose significant challenges. It still lacks mechanism to enable itself from policy violation.In this work, we describe various mechanisms that would enable self-protection on policy violation in cloud infrastructure. In particular, we discuss five critical mechanisms: IDS, Cyberoam, Federated Identity Management System, firewall and honeypot. Some solutions to mitigate these attacks on these mechanisms are also proposed along with a brief presentation on the future trends in cloud computingdeployment. Finally we evaluate these mechanisms based on the data collected from users in case they know how to protect their data in cloud environment.

Description

Description

FULL TEXT
Keywords

Keywords

Policy violation, cloud infrastructure, evaluating and self-protection
Links & Collections
Rights & License

Rights