IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 3    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 3,March 2012
Cloud Security using Honeypot Systems
Full Text(PDF, )  PP.37-42  
Author(s)
Nithin Chandra S.R, Madhuri T.M
KEYWORDS
-Cloud security;Honeypot;Types of Honeypots; Advantages and Disadvantages
ABSTRACT
Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC resource management and programming systems. These types of systems offer a new programming target for scalable application developers and have gained popularity over the past few years. However, most cloud computing systems in operation today are proprietary, rely upon infrastructure that is invisible to the research community, or are not explicitly designed to be instrumented and modified by systems researchers. Customers are both excited and nervous at the prospects of Cloud Computing. They are excited by the opportunities to reduce capital costs, for a chance to divest themselves, of infrastructure management and focus on core competencies, they are excited by the agility offered by the on-demand provisioning of computing and the ability to align information technology with business strategies and needs more readily. However, customers are also very concerned about the risks of Cloud Computing, if not properly secured there is loss of direct control over systems for which they are nonetheless accountable
References
[1] Lance Spitzner, “Honeypots Tracking Hackers”, 2003, Pearson Education, Inc

[2] RetoBaumann and Christian Plattner,“White Paper: Honeypots”, 26 February 2002 URL:

http://www.inf.ethz.ch/~plattner/pdf/whitepaper.pdf [3] Lance Spitzner, “Honeypots Definition and Value of Honeypots”, 17 May, 2002, URL: http://www.enteract.com/~lspitz/honeypot.html

[4] Kurt Seifried, “Honeypotting with VMWARE – basics”, 15 February 2002, URL: http://www.seifried.org/security/ids/20020107-honeypotvmware-basics.html

[5] Honeynet Project, “Know Your Enemy: Defining Virtual Honeynets, Different types of Virtual Honeynets”, 18 August 2002, URL: http://www.honeynet.org/papers/virtual/

[6]Wikipedia http://en.wikipedia.org/wiki/Honeypot_(computing)[7] F. Berman, G. Fox, and T. Hey. Grid Computing: Making the Global Infrastructure a Reality. Wiley and Sons, 2003.

[8] F. Chang, J. Dean, S. Ghemawat, W. Hsieh, D. Wal-lach, M. Burrows, T. Chandra, A. Fikes, and R. Gruber. Bigtable: A Distributed Storage System for Structured Data. Proceedings of 7th Symposium on Operating System Design and Implementation(OSDI), page 205218, 2006.

[9] J. Chase, D. Irwin, L. Grit, J. Moore, and S. Sprenkle. Dy-namic virtual clusters in a grid site manager. High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on, pages 90–100, 2003.

[10] J. Dean and S. Ghemawat. MapReduce: Simplified Data Processing on Large Clusters. Proceedings of 6th Sym-posium on Operating System Design and Implementa-tion(OSDI), pages 137–150, 2004

[11] G. DeCandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, A. Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels. Dynamo: amazon‟s highly available key-value store. Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, pages 205– 220, 2007.

[12] Enomalism elastic computing infrastructure. http://www.enomaly.com.

[14] I. Foster and C. Kesselman. Globus: A metacomputing infrastructure toolkit. International Journal of Supercom-puter Applications, 1997.

[15] I. Foster and C. Kesselman, editors. The Grid – Blueprint for a New Computing Infrastructure . Morgan Kaufmann,1998.

[16] I. Foster, C. Kesselman, J. Nick, and S. Tuecke. The phys-iology of the grid: An open grid services architecture for distributed systems integration, 2002.

[17] I. Foster, C. Kesselman, and S. Tuecke. The anatomy of the grid: Enabling scalable virtual organizations. Int. J. High Perform. Comput. Appl., 15(3):200–222, 2001.

[18] D. Gannon. Programming the grid: Distributed software components, 2002.

[19] Google – http://www.google.com/.

[20] D. Greschler and T. Mangan. Networking lessons in deliv-ering „software as a service‟: part i. Int. J. Netw. Manag. , 12(5):317–321, 2002.

[21] D. Greschler and T. Mangan. Networking lessons in deliv-ering ‟software as a service‟: part ii. Int. J. Netw. Manag., 12(6):339–345, 2002.

[22] R. Hiremane. Intel Virtualization Technology for Directed I/O (Intel VT-d). Technology@Intel Magazine , 4(10), May 2007.

[23] Honeypots: Tracking Hackers-http://www.tracking-hackers.com/

Untitled Page