{"title":"Cloud security tactics: Virtualization and the VMM","authors":"P. Kalagiakos, M. Bora","doi":"10.1109/ICAICT.2012.6398491","DOIUrl":null,"url":null,"abstract":"Cloud Computing is acclaimed to be the new paradigm that will reform organizations and pave the way to new and better business practices. Its abundant features captivated the interest of many individuals and organizations, either as customers or providers. The market, emboldened by optimistic reports regarding the future of cloud computing, demands further innovative services and features. The migration to cloud computing, however, is deterred by the issue of security. Especially, in virtual environments, security is a major concern, as multi-tenancy may facilitate cyber attacks at a massive scale. The subversion of a system implicates multiple customers, augmenting the potential impact. Thus, researchers have concentrated their efforts in designing architectures and techniques that will endorse security in virtualized environments of the cloud. In this paper, we present the latest proposed techniques which aim to enhance security and revolve directly or indirectly around the most important component of the virtual environment, the Virtual Machine Monitor.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2012.6398491","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Cloud Computing is acclaimed to be the new paradigm that will reform organizations and pave the way to new and better business practices. Its abundant features captivated the interest of many individuals and organizations, either as customers or providers. The market, emboldened by optimistic reports regarding the future of cloud computing, demands further innovative services and features. The migration to cloud computing, however, is deterred by the issue of security. Especially, in virtual environments, security is a major concern, as multi-tenancy may facilitate cyber attacks at a massive scale. The subversion of a system implicates multiple customers, augmenting the potential impact. Thus, researchers have concentrated their efforts in designing architectures and techniques that will endorse security in virtualized environments of the cloud. In this paper, we present the latest proposed techniques which aim to enhance security and revolve directly or indirectly around the most important component of the virtual environment, the Virtual Machine Monitor.