Abstract

Infrastructure as a Service (IaaS) provides logical separation between data, network, applications and machines from the physical constrains of real machines. IaaS is one of the basis of cloud virtualization. Recently, security issues are also gradually emerging with virtualization of cloud computing. Different security aspects of cloud virtualization will be explored in this research paper, security recognizing potential threats or attacks that exploit these vulnerabilities, and what security measures are used to alleviate such threats. In addition, a discussion of general security requirements and the existing security schemes is also provided. As shown in this paper, different components of virtualization environment are targets to various attacks that in turn leads to security issues compromising the whole cloud infrastructure. In this paper an overview of various cloud security aspects is also provided. Different attack scenarios of virtualization environments and security solutions to cater these attacks have been discussed in the paper. We then proceed to discuss API security concerns, data security, hijacking of user account and other security concerns. The aforementioned discussions can be used in the future to propose assessment criteria, which could be useful in analyzing the efficiency of security solutions of virtualization environment in the face of various virtual environment attacks.

Highlights

  • Information Technology (IT) area has faced numerous and newly emerged security issues, especially for organizations relying on virtual environments in their business

  • The term Virtualization is defined as the use of a software layer that lies beneath the operating systems which will be deployed on the same server while providing the same resources that would be demanded from physical hardware

  • 4.4 Desktop Virtualization Desktop Virtualization, called Virtual Desktop Infrastructure (VDI), is desktop operating system images run within virtual machines (VMs) that resides on physical server and are delivered to end point clients over a network

Read more

Summary

Introduction

Information Technology (IT) area has faced numerous and newly emerged security issues, especially for organizations relying on virtual environments in their business. With virtualization technology as the key technology of cloud computing, it has been recognized and developed quickly This innovative technology is transforming abstract infrastructure and resources such that multiple logical resources are available to users on a single server in isolated form through virtual machines (VMs) and Virtual Networks (VNs). Various benefits that can be provided by the virtualization are hardware utilization, resource protection, remote access, and other resources This technique gives organizations and people an opportunity to improve the use of hardware by increasing the number of tasks that one machine can handle. Whereas creating significant increase in IT agility, flexibility, and scalability, allowing workload mobility, enhanced performance, hardware resources availability, and automated operations, security issues are gradually emerging with virtualization of cloud computing. Cloud computing presents different security threats to organizations than traditional infrastructure due to service deployment method, operations and enabling technologies.

Virtualization Architecture
Problem Statement and Research Questions
Network Function Virtualization
Server Virtualization
Security Solutions for Virtualization
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.