{"title":"云计算中的虚拟化:现有解决方案和新方法","authors":"Meryeme Alouane, Hanan El Bakkali","doi":"10.1109/CLOUDTECH.2016.7847687","DOIUrl":null,"url":null,"abstract":"Virtualization and virtual environments are fundamental basics for data sharing in Cloud Computing. It is benefic for both the guest user and the provider: while it provides the first with the elements needed to execute his request, it gives the second the ability to be housing different guests with no additional cost. The central component in a virtual architecture is called hypervisor, having extra-privileges, which makes it able to play fundamental role of managing the sharing of data and resources. This hypervisor has many advantages regarding the cost, the simplicity of execution, the availability… But in the other hand, the major role played by this element makes it the perfect target for malicious users aiming to attack the virtual system. In this paper, we will analyze different approaches which try to solve the security issues of hypervisors, and then we will propose our own contribution to increase security in hypervisor related architectures.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":"{\"title\":\"Virtualization in Cloud Computing: Existing solutions and new approach\",\"authors\":\"Meryeme Alouane, Hanan El Bakkali\",\"doi\":\"10.1109/CLOUDTECH.2016.7847687\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Virtualization and virtual environments are fundamental basics for data sharing in Cloud Computing. It is benefic for both the guest user and the provider: while it provides the first with the elements needed to execute his request, it gives the second the ability to be housing different guests with no additional cost. The central component in a virtual architecture is called hypervisor, having extra-privileges, which makes it able to play fundamental role of managing the sharing of data and resources. This hypervisor has many advantages regarding the cost, the simplicity of execution, the availability… But in the other hand, the major role played by this element makes it the perfect target for malicious users aiming to attack the virtual system. In this paper, we will analyze different approaches which try to solve the security issues of hypervisors, and then we will propose our own contribution to increase security in hypervisor related architectures.\",\"PeriodicalId\":133495,\"journal\":{\"name\":\"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)\",\"volume\":\"113 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"18\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CLOUDTECH.2016.7847687\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CLOUDTECH.2016.7847687","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Virtualization in Cloud Computing: Existing solutions and new approach
Virtualization and virtual environments are fundamental basics for data sharing in Cloud Computing. It is benefic for both the guest user and the provider: while it provides the first with the elements needed to execute his request, it gives the second the ability to be housing different guests with no additional cost. The central component in a virtual architecture is called hypervisor, having extra-privileges, which makes it able to play fundamental role of managing the sharing of data and resources. This hypervisor has many advantages regarding the cost, the simplicity of execution, the availability… But in the other hand, the major role played by this element makes it the perfect target for malicious users aiming to attack the virtual system. In this paper, we will analyze different approaches which try to solve the security issues of hypervisors, and then we will propose our own contribution to increase security in hypervisor related architectures.