Skip to main content

Using Graph Theory for Cloud System Security Modeling

  • Conference paper
Computer Network Security (MMM-ACNS 2012)

Abstract

The paper discusses the security problems of cloud systems. It also contains a model of cloud systems that allows formally describe different security problems. The proposed model is based on graph theory and it describes main features of virtual machines in cloud systems. The paper formally presents a transformation of data operations that happens in hypervisor software due to virtualization technology. It allows formally define several cloud system security problems of hypervisor software. The paper also contains a discussion about other security problems with shared virtual machines in the cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Catteddu, D., Hogben, G.: Cloud Computing. In: Benefits, Risks and Recommendations for Information Security / European Network and Information Security Agency, ENISA (November 2009)

    Google Scholar 

  2. Michael, H.R.: VMware vSphere in the Enterprise (July 28, 2009), www.hypervisor.com

  3. Zegzhda, P.D., Zegzhda, D.P.: Dynamic security methodology / MaBIT conference materials

    Google Scholar 

  4. Clark, C.: Live Migration of Virtual Machines. University of Cambridge Computer Laboratory Cambridge, UK, Department of Computer Science University of Copenhagen, Denmark

    Google Scholar 

  5. Jones, M.T.: Anatomy of a cloud storage infrastructure / IBM developer works (November 30, 2010)

    Google Scholar 

  6. How Does Xen Work? (December 2009), http://www.xen.org/files/Marketing/HowDoesXenWork.pdf

  7. Elhage, N.: Virtunoid: A KVM Guest ! Host privilege escalation exploit / Black Hat USA (2011)

    Google Scholar 

  8. Weinman, J.: Axiomatic Cloud Theory. Working Paper (July 29, 2011)

    Google Scholar 

  9. Chan, W.K., Mei, L., Zhang, Z.: Modeling and Testing of Cloud Applications. City University of Hong Kong and The University of Hong Kong (2009)

    Google Scholar 

  10. Li, Y., Boucelma, O.: A CPN Provenance Model of Workflow: Towards Diagnosis in the Cloud. Laboratoire des Sciences de l’Information et des Systémes, Domaine Universitaire de Saint-Jérôme

    Google Scholar 

  11. Ma, H., Schewe, K.D., Thalheim, B., Wang, Q.: A Formal Model for the Interoperability of Service Clouds (December 22, 2011)

    Google Scholar 

  12. Henzinger, T.A., Singh, A.V., Singh, V., Wies, T., Zufferey, D.: FlexPRICE: Flexible Provisioning of Resources in a Cloud Environment / IST Austria

    Google Scholar 

  13. Zegzhda, P.D., Zegzhda, D.P., Karetnikov, A.V.: Cloud systems. In: Virtual Security or Secure Virtualization? / Proc. of the Conference ”RusCrypto” (2012)

    Google Scholar 

  14. Zegzhda, D.P., Karetnikov, A.V.: Cloud systems security. In: Problems and Prospect / (ISSN-2071-8217) Information Security Application #4 (2011)

    Google Scholar 

  15. Drouineaud, M., Luder, A., Sohr, K.: A Role based Access Control Model for Agent based Control Systems

    Google Scholar 

  16. Kalinin, M., Konoplev, A., Markov, Y.: Control of the security policies requirements in grid-systems. In: Proc. of the Conference Information Security of Russian Regions (ISRR 2011). St. Petersburg, Russia (2011)

    Google Scholar 

  17. Stepanova, T.: The relations between user behavior and outgoing network traffic for behaveiour anomaly detection. In: Proc. of the Conference Information Security of Russian Regions (ISRR 2011). St. Petersburg, Russia (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zegzhda, P.D., Zegzhda, D.P., Nikolskiy, A.V. (2012). Using Graph Theory for Cloud System Security Modeling. In: Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2012. Lecture Notes in Computer Science, vol 7531. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33704-8_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33704-8_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33703-1

  • Online ISBN: 978-3-642-33704-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics