Security Aspects of Virtualization in Cloud Computing

作者: Muhammad Kazim , Rahat Masood , Muhammad Awais Shibli , Abdul Ghafoor Abbasi

DOI: 10.1007/978-3-642-40925-7_22

关键词:

摘要: In Cloud computing, virtualization is the basis of delivering Infrastructure as a Service (IaaS) that separates data, network, applications and machines from hardware constraints. Although computing has been focused area research in last decade, on security not extensive. this paper, different aspects have explored. Specifically, we identified: i) requirements for which can be used step towards securing virtual infrastructure Cloud, ii) attacks launched infrastructure, iii) solutions to secure environment by overcoming possible threats attacks.

参考文章(14)
Rasib Hassan Khan, Jukka Ylitalo, Abu Shohel Ahmed, OpenID authentication as a service in OpenStack information assurance and security. pp. 372- 377 ,(2011) , 10.1109/ISIAS.2011.6122782
Mikhail I. Gofman, Ruiqi Luo, Ping Yang, Kartik Gopalan, SPARC Proceedings of the 10th annual ACM workshop on Privacy in the electronic society - WPES '11. pp. 115- 124 ,(2011) , 10.1145/2046556.2046571
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger, Flexible security configuration for virtual machines Proceedings of the 2nd ACM workshop on Computer security architectures - CSAW '08. pp. 35- 44 ,(2008) , 10.1145/1456508.1456515
Jinzhu Kong, Protecting the Confidentiality of Virtual Machines Against Untrusted Host information processing and trusted computing. pp. 364- 368 ,(2010) , 10.1109/IPTC.2010.11
Dan Pelleg, Muli Ben-Yehuda, Rick Harper, Lisa Spainhower, Tokunbo Adeshiyan, Vigilant: out-of-band detection of failures in virtual machines Operating Systems Review. ,vol. 42, pp. 26- 31 ,(2008) , 10.1145/1341312.1341319
Wu Zhou, Peng Ning, Xiaolan Zhang, Glenn Ammons, Ruowen Wang, Vasanth Bala, Always up-to-date: scalable offline patching of VM images in a compute cloud annual computer security applications conference. pp. 377- 386 ,(2010) , 10.1145/1920261.1920317
Jakub Szefer, Ruby B. Lee, A Case for Hardware Protection of Guest VMs from Compromised Hypervisors in Cloud Computing international conference on distributed computing systems workshops. pp. 248- 252 ,(2011) , 10.1109/ICDCSW.2011.51
Zhi Wang, Xuxian Jiang, HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity ieee symposium on security and privacy. pp. 380- 395 ,(2010) , 10.1109/SP.2010.30
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer Rexford, Eliminating the hypervisor attack surface for a more secure cloud Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 401- 412 ,(2011) , 10.1145/2046707.2046754
Flavio Lombardi, Roberto Di Pietro, Secure virtualization for cloud computing Journal of Network and Computer Applications. ,vol. 34, pp. 1113- 1122 ,(2011) , 10.1016/J.JNCA.2010.06.008