[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2905055.2905315acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

Security Challenges of Virtualization in Cloud Computing

Published: 04 March 2016 Publication History

Abstract

Recent years have been advanced in cloud computing technology. Virtualization supports cloud computing to virtualize the resources to provide software-as-a-service, infrastructure-as-a-service and platform-as-a-service mainly. Many Virtual Machines are used in computing which gives flexibility, agility and scalability to the cloud resources that allow manipulating their Virtual Machines. Virtualized computing provides the virtual machines to client to access the resources at remote locations. Virtualization gives the features of resource utilization, isolation among hardware, operating system and software. Virtualization gives the features of multitenancy for simultaneously access of Virtual Machines, which machines are allocated in single physical machine. Virtual machine can be created, copied and migrated. This flexibility leads to security challenges. This paper presents an analysis report of the current security vulnerabilities in virtualization.

References

[1]
Menasce, Daniel A. "Virtualization: Concepts, applications, and performance modeling." In Int. CMG Conference, pp. 407--414. 2005.
[2]
Tej Koganti, Krishna, Eswar Patnala, Sai Sagar Narasingu, and J. N. Chaitanya. "Virtualization Technology in Cloud Computing Environment." International Journal of Emerging Technology and Advanced Engineering V3 (2013).
[3]
Aishwarya Anand "Amazon's Approach to Cloud Security" Proceedings of 4th IRF International Conference, Pune, 16th March-2014, ISBN: 978-93-82702-66-5 pp. 173--178, 2014
[4]
https://www.google.co.in/trends/explore#q=cloud%20computing%20security
[5]
Jasti, Amarnath, Payal Shah, Rajeev Nagaraj, and Ravi Pendse. "Security in multi-tenancy cloud." In Security Technology (ICCST), 2010 IEEE International Carnahan Conference on, pp. 35--41. IEEE, 2010.
[6]
Gabriel Cephas Obasuyi, Arif Sari "Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment", Int. J. Communications, Network and System Sciences, 8, 260--273, 2015
[7]
Ankita Desai, Rachana Oza, Pratik Sharma, Bhautik Patel "Hypervisor: A Survey on Concepts and Taxonomy" International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278--3075, Volume-2, Issue-3, February 2013 pp. 222--225
[8]
Hashizume, Keiko, David G. Rosado, Eduardo Fernández-Medina, and Eduardo B. Fernandez. "An analysis of security challenges for cloud computing." Journal of Internet Services and Applications 4, no. 1 (2013): 1--13.
[9]
Husain, Zeshan, and Akshay Gummadi. "Vulnerabilities in Cloud Computing." http://www.chinacloud.cn/upload/2013-05/13050613111874.pdf (2013).
[10]
Gonzalez, Nelson, Charles Miers, Fernando Redigolo, Marcos Simplicio, Tereza Carvalho, Mats Näslund, and Makan Pourzandi. "A quantitative analysis of current security concerns and solutions for cloud computing, "Journal of Cloud Computing 1, no. 1 (2012): 1--18.
[11]
García-Valls, Marisol, Tommaso Cucinotta, and Chenyang Lu. "Challenges in real-time virtualization and predictable cloud computing." Journal of Systems Architecture 60, no. 9 (2014): 726--740
[12]
Catteddu, Daniele. "Cloud Computing: benefits, risks and recommendations for information security." In Web Application Security, pp. 17--17. Springer Berlin 2010.
[13]
Somorovsky, Juraj, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, and Luigi Lo Iacono. "All your clouds are belonging to us: security analysis of cloud management interfaces." 3rd ACM workshop on Cloud computing security workshop, pp. 3--14. ACM, 2011.

Cited By

View all
  • (2021)BTDetect: An Insider Threats Detection Approach Based on Behavior Traceability for IaaS Environments2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00055(344-351)Online publication date: Sep-2021
  • (2021)CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN48987.2021.00047(350-362)Online publication date: Jun-2021
  • (2021)Cloud Computing Security Challenges and Related Defensive Measures: A Survey and TaxonomySN Computer Science10.1007/s42979-021-00732-32:4Online publication date: 10-Jun-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
March 2016
843 pages
ISBN:9781450339629
DOI:10.1145/2905055
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 March 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Security
  2. Virtual Machine
  3. Virtualization

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICTCS '16

Acceptance Rates

Overall Acceptance Rate 97 of 270 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)20
  • Downloads (Last 6 weeks)1
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)BTDetect: An Insider Threats Detection Approach Based on Behavior Traceability for IaaS Environments2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00055(344-351)Online publication date: Sep-2021
  • (2021)CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN48987.2021.00047(350-362)Online publication date: Jun-2021
  • (2021)Cloud Computing Security Challenges and Related Defensive Measures: A Survey and TaxonomySN Computer Science10.1007/s42979-021-00732-32:4Online publication date: 10-Jun-2021
  • (2018)CF-CloudOrchThe Journal of Supercomputing10.1007/s11227-018-2493-474:12(7024-7045)Online publication date: 1-Dec-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media