Full Paper View Go Back

Security Challenges of Virtualization in Cloud Environment

Anitha H M1 , P. Jayarekha2

  1. Dept of Information Science & Engineering., BMSCE, Autonomous College under VTU, Bangalore, India.
  2. Dept of Information Science & Engineering., BMSCE, Autonomous College under VTU, Bangalore, India.

Correspondence should be addressed to: anithahm.ise@bmsce.ac.in.


Section:Review Paper, Product Type: Isroset-Journal
Vol.6 , Issue.1 , pp.37-43, Feb-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v6i1.3743


Online published on Feb 28, 2018


Copyright © Anitha H M, P. Jayarekha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Anitha H M, P. Jayarekha , “Security Challenges of Virtualization in Cloud Environment,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.37-43, 2018.

MLA Style Citation: Anitha H M, P. Jayarekha "Security Challenges of Virtualization in Cloud Environment." International Journal of Scientific Research in Computer Science and Engineering 6.1 (2018): 37-43.

APA Style Citation: Anitha H M, P. Jayarekha , (2018). Security Challenges of Virtualization in Cloud Environment. International Journal of Scientific Research in Computer Science and Engineering, 6(1), 37-43.

BibTex Style Citation:
@article{M_2018,
author = {Anitha H M, P. Jayarekha },
title = {Security Challenges of Virtualization in Cloud Environment},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {2 2018},
volume = {6},
Issue = {1},
month = {2},
year = {2018},
issn = {2347-2693},
pages = {37-43},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=537},
doi = {https://doi.org/10.26438/ijcse/v6i1.3743}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.3743}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=537
TI - Security Challenges of Virtualization in Cloud Environment
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Anitha H M, P. Jayarekha
PY - 2018
DA - 2018/02/28
PB - IJCSE, Indore, INDIA
SP - 37-43
IS - 1
VL - 6
SN - 2347-2693
ER -

2983 Views    1196 Downloads    268 Downloads
  
  

Abstract :
Cloud computing is the latest technology used by different category of users. Cloud computing services such as Software as service, Platform as service and Infrastructure as service are offered to the users using virtualization technology. Virtualization enables sharing resources of one system such as CPU, Memory and Storage to many users as per the requirement. Mainly Infrastructure as service is offered to the users through the virtual machines. Although there are advantages of using the virtual machines, security is one of the aspect which is taken care to a lesser extent. Virtual machines are exposed to different attacks such as malwares, malicious users. There are threats like denial of service, cross virtual machine attacks, insecure virtual machine migration, attacks on virtual machine image and hypervisor etc., hence virtual machine security has to be looked with high priority. Mitigation of the risks at virtualization level are surveyed.In this paper, several security vulnerabilities are identified and present various algorithms and implemented approaches to provide security to virtualization layer.

Key-Words / Index Term :
Virtual Machine, Hypervisor, Virtualization, Cloud provider,Denial of Service, Cross Virtual Machine attacks

References :
[1] Avram, Maricela-Georgiana. "Advantages and challenges of adopting cloud computing from an enterprise perspective." Procedia Technology 12 ,pp.529-534,2014.
[2] Shoaib, Yasir, and Olivia Das. "Pouring Cloud Virtualization Security Inside Out." arXiv preprint arXiv:pp.1411.3771,2014.
[3] Traditional systems and virtualized systems, https://www.vmware.com/pdf/virtualization.pdf. Accessed on January 25,2018.
[4] S Malhotra, Lakshay, Devyani Agarwal, and Arunima Jaiswal. "Virtualization in cloud computing." J. Inform. Tech. Softw. Eng4.2 ,2014.
[5] Daniel A. Menasce, "Virtualization: Concepts, applications, and performance modeling." In Int. CMG Conference, pp. 407-414. 2005.
[6] Jenni Susan Reuben, “A Survey on Virtual Machine Security”, Seminar of Network Security, Helsinki University of Technology, 2007.
[7] Farzad Sabahi, "Virtualization-level security in cloud computing." Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. IEEE, pp. 250-254, 2011.
[8] Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B.. "An analysis of security issues for cloud computing." Journal of Internet Services and Applications 4.1 (2013): 5,2013.
[9] Christopher Jarabek, "A Review of Cloud Computing Security: Virtualization, Side-Channel Attacks, and Management ", from University of Calgary: http://people.ucalgary.ca/~cjjarabe/papers /jarabek_cloud_security.pdf, 2011.
[10] Kazim, Muhammad, Rahat Masood, Muhammad Awais Shibli, and Abdul Ghafoor Abbasi. "Security aspects of virtualization in cloud computing." In Computer Information Systems and Industrial Management, pp. 229-240. Springer, Berlin, Heidelberg, 2013.
[11] Covert channels, https://www.sans.org/security-resources/ idfaq/what-is-covert-channel/ -and-what-are-some-examples/2/17.Accessed on 3 November 2017.
[12] Leginamate users and Attackers,https://blog.radware.com/security/2013/06/distinguish-between-legitimate-users-and-/attackers-the-secret-/-sauce-of-ddos-protection/.Accessed on 3 November 2017.
[13] Virtual Machine Access, https://www.pcisecuritystandards.org/documents/Virtualization_InfoSupp_v2.pdf.Accessed on 25 january,2018.
[14] Li, Min, Yulong Zhang, Kun Bai, Wanyu Zang, Meng Yu, and Xubin He. "Improving Cloud Survivability through Dependency based Virtual Machine Placement." In SECRYPT, pp. 321-326. 2012.
[15] Wahid, Khan Ferdous, Nicolai Kuntze, and Carsten Rudolph. "Trusted Virtual Machine Management for Virtualization in Critical Environments." In ICS-CSR. 2013.
[16] Wu, Hanqian, Yi Ding, Chuck Winer, and Li Yao. "Network security for virtual machine in cloud computing." In Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference on, pp. 18-21. IEEE, 2010.
[17] Schwarzkopf, Roland, Matthias Schmidt, Christian Strack, Simon Martin, and Bernd Freisleben. "Increasing virtual machine security in cloud environments." Journal of Cloud Computing: Advances, Systems and Applications 1, no. 1 (2012): 12,2012.
[18] Almodawar, Abdalrhman, Mahmoud Al-Ayyoub, and S. Mohammad. "Security-aware placement and migration algorithm in iaas interclouds." The fourth international conference on information and communication systems (ICICS 2013). 2013.
[19] Su, Kui, Lei Xu, Cong Chen, Wenzhi Chen, and Zonghui Wang. "Affinity and conflict-aware placement of virtual machines in heterogeneous data centers." In Autonomous Decentralized Systems (ISADS), 2015 IEEE Twelfth International Symposium on, pp. 289-294. IEEE, 2015.
[20] Wang, Gary, Zachary John Estrada, Cuong Manh Pham, Zbigniew T. Kalbarczyk, and Ravishankar K. Iyer. "Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring." In WOOT. 2015.
[21] Lombardi, Flavio, and Roberto Di Pietro. "Secure virtualization for cloud computing." Journal of Network and Computer Applications 34.4 (2011): 1113-1122,2011.
[22] Ammons, Glenn, Vasanth Bala, Todd Mummert, Darrell Reimer, and Xiaolan Zhang. "Virtual machine images as structured data: the mirage image library." Proceedings of the USENIX HotCloud , 2011.
[23] Wei, Jinpeng, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, and Peng Ning. "Managing security of virtual machine images in a cloud environment." In Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 91-96. ACM, 2009.
[24] Sabahi, Farzad. "Secure virtualization for cloud environment using hypervisor-based technology." International Journal of Machine Learning and Computing 2.1 (2012): 39,2012.
[25] Aiash, Mahdi, Glenford Mapp, and Orhan Gemikonakli. "Secure live virtual machines migration: issues and solutions." Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on. IEEE, 2014.
[26] Anala, M. R., Jyoti Shetty, and G. Shobha. "A framework for secure live migration of virtual machines." Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on. IEEE, 2013.
[27] Nagesh, O. Sri, Tapas Kumar, and Venkateswara Rao Vedula. "A Survey on Security Aspects of Server Virtualization in Cloud Computing." International Journal of Electrical and Computer Engineering (IJECE) 7.3 (2017): pp.1326-1336,2017.
[28] Anitya Kumar Gupta, Srishti Gupta, "Security Issues in Big Data with Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.6, pp.27-32, 2017

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation