Javascript must be enabled to continue!
A Security Analysis and Assessment for Petri Net-Based OpenStack Cloud Infrastructure
View through CrossRef
Abstract
Cloud computing is an important innovation in the current computing model that can provide an easy way to host and manage infrastructure and applications. Accordingly, due to the rapid growth of cloud computing over the past few years, security concerns have been raised. Various methods have been proposed for more security in the use of cloud computing, but not enough efforts have been made to evaluate the above methods. Providing and guaranteeing security as one of the most important open issues in cloud computing has always been the focus of researchers. The cloud service provider must adopt the necessary security strategies to increase the security of service allocation, operation continuity, storage management, information security and privacy protection in order to satisfy and reassure customers. Dealing with the challenges and threats identified in this environment requires providing a basic solution. In this article, infrastructure services as a service in cloud computing are described and the vulnerability of each is analyzed. According to the Petri net modeling tool, a new method to evaluate the security of infrastructure systems as a service is presented and analyzed. In this method, it is tried to be able to analyze the desired service provider and then define it through official models, thus creating an executive model of it, which can be serviced by applying existing security features. He evaluated the intended provider in terms of security and other characteristics. With the help of this method, the level of security of infrastructure systems as a service in cloud computing can be compared and evaluated. Then, using the Petri net modeling tool, one of the famous business systems for providing infrastructure as a service called Openstack is modeled and the behavior of attacks on it is evaluated. Applying the mentioned method on the Openstack system shows that our work has good security and it is expected that researchers, designers and companies providing cloud services will make significant use of the results in order to increase the security of services.
Title: A Security Analysis and Assessment for Petri Net-Based OpenStack Cloud Infrastructure
Description:
Abstract
Cloud computing is an important innovation in the current computing model that can provide an easy way to host and manage infrastructure and applications.
Accordingly, due to the rapid growth of cloud computing over the past few years, security concerns have been raised.
Various methods have been proposed for more security in the use of cloud computing, but not enough efforts have been made to evaluate the above methods.
Providing and guaranteeing security as one of the most important open issues in cloud computing has always been the focus of researchers.
The cloud service provider must adopt the necessary security strategies to increase the security of service allocation, operation continuity, storage management, information security and privacy protection in order to satisfy and reassure customers.
Dealing with the challenges and threats identified in this environment requires providing a basic solution.
In this article, infrastructure services as a service in cloud computing are described and the vulnerability of each is analyzed.
According to the Petri net modeling tool, a new method to evaluate the security of infrastructure systems as a service is presented and analyzed.
In this method, it is tried to be able to analyze the desired service provider and then define it through official models, thus creating an executive model of it, which can be serviced by applying existing security features.
He evaluated the intended provider in terms of security and other characteristics.
With the help of this method, the level of security of infrastructure systems as a service in cloud computing can be compared and evaluated.
Then, using the Petri net modeling tool, one of the famous business systems for providing infrastructure as a service called Openstack is modeled and the behavior of attacks on it is evaluated.
Applying the mentioned method on the Openstack system shows that our work has good security and it is expected that researchers, designers and companies providing cloud services will make significant use of the results in order to increase the security of services.
Related Results
Developing a Cloud Computing Framework for University Libraries
Developing a Cloud Computing Framework for University Libraries
Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit...
Providing a method for security analysis and evaluation of infrastructure services in cloud computing
Providing a method for security analysis and evaluation of infrastructure services in cloud computing
Abstract
Today, cloud security is necessary to improve the service allocation, continuity of operations, storage management, information security and. In this way, analyzin...
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...
Hybrid Cloud Scheduling Method for Cloud Bursting
Hybrid Cloud Scheduling Method for Cloud Bursting
In the paper, we consider the hybrid cloud model used for cloud bursting, when the computational capacity of the private cloud provider is insufficient to deal with the peak number...
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...
Does Selection of Open Source Cloud Computing Platforms is a Confusing Task?
Does Selection of Open Source Cloud Computing Platforms is a Confusing Task?
Over the last few years the majority of small and large companies moving to cloud computing to develop IT solutions for businesses. It is technology which provides distributed and ...
Assessing Security with Regard to Cloud Applications in STEM Education
Assessing Security with Regard to Cloud Applications in STEM Education
There are many steps involved with securing a cloud system and its applications (SaaS) and developed ones in (PaaS). Security and privacy issues represent the biggest concerns to m...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...

