SAI_paper_final_draft.pdf (232.96 kB)
Download file

Infrastructure as a service: exploring network access control challenges

Download (232.96 kB)
conference contribution
posted on 13.01.2017, 13:33 by Shadha Al-Amri, Lin GuanLin Guan
Cloud Computing Infrastructure as a Service (IaaS) is a great model for outsourcing IT infrastructure. It is built to offer fascinating features to support business development, such as elasticity, multi-tenancy, configurability and dynamicity. However, IaaS faces security challenges on account of its flexible nature. For this article, we studied the IaaS characteristics and investigated their related security challenges. We then elaborated these security challenges by exploring the security threats on live virtual machine migration as it is one of the main IaaS operations. We found that proper access control techniques and models are a critical element in enhancing IaaS and mitigating the identified security threats. Therefore, we investigated and contrasted the implemented and the proposed firewall architectures in IaaS as a firewall is a basic security appliance that enforces access control. We also explored and contrasted the proposed access control models in the IaaS. It was found that the traditional firewalls and access control models were not sufficient for IaaS. Therefore, there is a need to develop a proper access control model and enforcement techniques to mitigate IaaS security threats. Based on the security research trend and the results obtained in this articles exploration, we endorse an IaaS access control system built on a computational intelligent approach.



  • Science


  • Computer Science

Published in

IEEE- SAI Computing Conference


AL-AMRI, S. and GUAN, L., 2016. Infrastructure as a service: exploring network access control challenges. Presented at the SAI Computing Conference (SAI 2016), London, UK, 13-15th July, pp. 596-603.




AM (Accepted Manuscript)

Acceptance date


Publication date



© IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.






London, UK