An Audit of Server Hardening in Multi-Tenantarchitecture System in Cloud Computing
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2014, Vol 3, Issue 12
Abstract
In cloud computing, multi-tenancy is the architecture in which hardware and software can be shared with multiple users (tenant). In existing system, there is no protection on the operating system level when corporate or individual is reserving any system in cloud computing by default. Most of the corporate or individuals are using either “Single Tenant” or “Multi-Tenant” model. In both of the approach there are vulnerable attacks. And they do not have much knowledge of the “Server Hardening” to secure their servers. The main objective of the proposed system “An Audit of Server Hardening in Multi-Tenant Architecture System in Cloud Computing” is to secure multi-tenancy architecture system. In this model, the server or system is secured by applying technique called ‘Server Hardening’ using Linux server from ‘Amazon’ called “Amazon Elastic Compute Cloud (Amazon EC2”. To audit the level of security a cloud system provides an open source tool called ‘Lynis’. This tool was utilized to determine the state of hardening of the present available system such as Fedora, Red Hat, Ubuntu etc., that cloud services vendors provides. The future of the system, to apply the ‘Server Hardening’ to secure the system or server, need to create a module for major Linux family operating systems like Ubuntu, RedHat and SuSE
An Optimized algorithm to select the appropriate Schema in Data Warehouses
The successful organization is the result of the successful decisions made by the top management. These are the collaborated decisions and require a lump sum data or the consolidated view of organization, which is...
Neural Signal – Action Potential Spike Count Transmision Through Embedded Wireless Mote
To enable a wireless neural recording system that benefit to finding the disease from the nerves system is remotely monitoring as prevention is better than cure. The neural recording system is counting the spike value f...
OLD IS GOLD W.R.TO EDUCATIONAL SECTOR
Over the past two decades the word “Globalization” has become a common word that is heard in many international conferences and large gatherings. A number of definitions of globalization related to the provisi...
A Review on Energy Efficient Approaches for AODV Protocol
Recent years have seen a tremendous growth and application of mobile adhoc networks. MANET has essentially become a part and parcel of modern day lifestyle. One of the challenges faced by MANET is of energy consumption...
A Digital Video Watermarking Technique Based on Frame Extraction in 6-Level DWT
Digital video watermarking was introduced at the end of the last century to provide means of enforcing video copyright protection. Video watermarking involves embedding secret information in the video. In this pap...