Self-aware deployment enforcement of virtualized and cloud-based images

Ethan Hadar, Amir Jerbi, Irit Hadar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This position paper presents our approach for deployment enforcement of virtual images (VM), in order to prevent an unauthorized usage, potential insider threat, and theft of VMs. In existing systems, regular images in a virtual environment can be mounted and installed in a different location, while our system prevents the intentional and unintentional roaming of these images, triggered by either humans or automation tools. This paper proposes an approach that secures installation location according to policy in virtualized environments, by intercepting the image installation process.

Original languageEnglish
Title of host publicationCLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science
Pages602-605
Number of pages4
StatePublished - 2012
Event2nd International Conference on Cloud Computing and Services Science, CLOSER 2012 - Porto, Portugal
Duration: 18 Apr 201221 Apr 2012

Publication series

NameCLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science

Conference

Conference2nd International Conference on Cloud Computing and Services Science, CLOSER 2012
Country/TerritoryPortugal
CityPorto
Period18/04/1221/04/12

Keywords

  • Cloud security vulnerabilities
  • Cloud virtualization
  • Infrastructure as a service
  • Privileged access management

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Self-aware deployment enforcement of virtualized and cloud-based images'. Together they form a unique fingerprint.

Cite this