Abstract

Service providers provide virtualized IT resources by using Internet technologies in their services. Users use the provided IT resources as much as they want and pay the corresponding fee. In such cloud computing environments, issues of malicious codes, hacking and leak of confidential information are the biggest concerns of the people involved. In this paper, we study the virtualization security management, which is important for the proper management of collection of virtualization resources information and security events, monitoring and analysis of cloud security situations, and cloud security policies. Specifically, we propose the structuring of the virtualization security management system and the management method to reduce the complexity of administering the virtual machines installed in the cloud data centers caused by the inherent properties of virtual machines characterized by dynamic changes in the form of image files. Therefore, we studied the tracing method for history of infected virtual machines following an analysis of the VM lifecycle status and VM running states.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.