Volume 14, Issue 3, February 2016, Pages 795–800
Yassine EL MAHOTI1, Noura Aknin2, and Kamal Eddine El-Kadiri3
1 Information Technology and Modeling Systems Research Unit, Faculty of Sciences, Abdelmalek Essaadi University, Tetouan, Morocco
2 Information Technology and Modeling Systems Research Unit, Faculty of Sciences, Abdelmalek Essaadi University, Tetouan, Morocco
3 Computer Sciences, Operational Research and Applied Statistics Laboratory, Faculty of Sciences, Abdelmalek Essaadi University, Tetouan, Morocco
Original language: English
Copyright © 2016 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
This recent years, the security of cloud computing has become a major challenge for all organizations because any attack can cause serious problems such as stealing customer and government information, control of systems by others entities (hackers) to perform any operation for their needs, etc. The last decade, the cyber-attacks have become increasingly complex, sophisticated, multiple and the majority of traditional security systems are unable to detect them.
The goal of this article is present a secure layer installed in the cloud providers that allows a high security performance in the cloud environment. This is achieved by controlling all the services executed by customers on their virtual machines and block or quarantine the unknown of them until the provider decision is made.
Author Keywords: Cloud Computing, Dynamic security, Cyber-attacks, Virtualization.
Yassine EL MAHOTI1, Noura Aknin2, and Kamal Eddine El-Kadiri3
1 Information Technology and Modeling Systems Research Unit, Faculty of Sciences, Abdelmalek Essaadi University, Tetouan, Morocco
2 Information Technology and Modeling Systems Research Unit, Faculty of Sciences, Abdelmalek Essaadi University, Tetouan, Morocco
3 Computer Sciences, Operational Research and Applied Statistics Laboratory, Faculty of Sciences, Abdelmalek Essaadi University, Tetouan, Morocco
Original language: English
Copyright © 2016 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
This recent years, the security of cloud computing has become a major challenge for all organizations because any attack can cause serious problems such as stealing customer and government information, control of systems by others entities (hackers) to perform any operation for their needs, etc. The last decade, the cyber-attacks have become increasingly complex, sophisticated, multiple and the majority of traditional security systems are unable to detect them.
The goal of this article is present a secure layer installed in the cloud providers that allows a high security performance in the cloud environment. This is achieved by controlling all the services executed by customers on their virtual machines and block or quarantine the unknown of them until the provider decision is made.
Author Keywords: Cloud Computing, Dynamic security, Cyber-attacks, Virtualization.
How to Cite this Article
Yassine EL MAHOTI, Noura Aknin, and Kamal Eddine El-Kadiri, “Implementation a dynamic security in the Cloud computing environment,” International Journal of Innovation and Applied Studies, vol. 14, no. 3, pp. 795–800, February 2016.