Cloud security tactics: Virtualization and the VMM

P. Kalagiakos, M. Bora
{"title":"Cloud security tactics: Virtualization and the VMM","authors":"P. Kalagiakos, M. Bora","doi":"10.1109/ICAICT.2012.6398491","DOIUrl":null,"url":null,"abstract":"Cloud Computing is acclaimed to be the new paradigm that will reform organizations and pave the way to new and better business practices. Its abundant features captivated the interest of many individuals and organizations, either as customers or providers. The market, emboldened by optimistic reports regarding the future of cloud computing, demands further innovative services and features. The migration to cloud computing, however, is deterred by the issue of security. Especially, in virtual environments, security is a major concern, as multi-tenancy may facilitate cyber attacks at a massive scale. The subversion of a system implicates multiple customers, augmenting the potential impact. Thus, researchers have concentrated their efforts in designing architectures and techniques that will endorse security in virtualized environments of the cloud. In this paper, we present the latest proposed techniques which aim to enhance security and revolve directly or indirectly around the most important component of the virtual environment, the Virtual Machine Monitor.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2012.6398491","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Cloud Computing is acclaimed to be the new paradigm that will reform organizations and pave the way to new and better business practices. Its abundant features captivated the interest of many individuals and organizations, either as customers or providers. The market, emboldened by optimistic reports regarding the future of cloud computing, demands further innovative services and features. The migration to cloud computing, however, is deterred by the issue of security. Especially, in virtual environments, security is a major concern, as multi-tenancy may facilitate cyber attacks at a massive scale. The subversion of a system implicates multiple customers, augmenting the potential impact. Thus, researchers have concentrated their efforts in designing architectures and techniques that will endorse security in virtualized environments of the cloud. In this paper, we present the latest proposed techniques which aim to enhance security and revolve directly or indirectly around the most important component of the virtual environment, the Virtual Machine Monitor.
云安全策略:虚拟化和VMM
云计算被认为是一种新的范式,它将改革组织,为新的、更好的业务实践铺平道路。它丰富的特性吸引了许多个人和组织的兴趣,无论是作为客户还是作为提供商。有关云计算未来的乐观报告鼓舞了市场,要求进一步创新的服务和功能。然而,向云计算的迁移受到安全问题的阻碍。特别是在虚拟环境中,安全性是一个主要问题,因为多租户可能会促进大规模的网络攻击。系统的颠覆涉及多个客户,从而增加了潜在的影响。因此,研究人员集中精力设计架构和技术,以支持云的虚拟化环境中的安全性。在本文中,我们提出了最新提出的技术,旨在提高安全性,并直接或间接地围绕虚拟环境中最重要的组件,虚拟机监视器。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信