Abstract
In Cloud computing, virtualization is the basis of delivering Infrastructure as a Service (IaaS) that separates data, network, applications and machines from hardware constraints. Although Cloud computing has been a focused area of research in the last decade, research on Cloud virtualization security has not been extensive. In this paper, different aspects of Cloud virtualization security have been explored. Specifically, we have identified: i) security requirements for virtualization in Cloud computing which can be used as a step towards securing virtual infrastructure of Cloud, ii) attacks that can be launched on Cloud virtual infrastructure, and iii) security solutions to secure the virtualization environment by overcoming the possible threats and attacks.
Chapter PDF
Similar content being viewed by others
Keywords
References
Orlando, D.: Cloud computing service models, http://www.ibm.com/developerworks/cloud/library/cl-cloudservices1iaas/cl-cloudservices1iaas-pdf.pdf (last accessed: October 27, 2012)
Hoffman, P., Scarfone, K., Souppaya, M.: Guide to security for full virtualization technologies. National Institute of Standards and Technology (NIST), 800–125 (2011)
Brunette, G., Mogull, R., et al.: Security guidance for critical areas of focus in cloud computing v2.1. Cloud Security Alliance, 1–76 (2009)
Council, V.S.I.G.P.S.S.: Pci dss virtualization guidelines v2.0, 1–39 (2011)
ALERTLOGIC: State of cloud security report: Targeted attacks and real world hacks, http://www.alertlogic.com/resources/cloud-security-report/ (last accessed: April 14, 2013)
Szefer, J., Keller, E., Lee, R.B., Rexford, J.: Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 401–412. ACM (2011)
Szefer, J., Lee, R.B.: A case for hardware protection of guest vms from compromised hypervisors in cloud computing. In: 2011 31st International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 248–252. IEEE (2011)
Kong, J.: Protecting the confidentiality of virtual machines against untrusted host. In: 2010 International Symposium on Intelligence Information Processing and Trusted Computing (IPTC), pp. 364–368. IEEE (2010)
Gofman, M.I., Luo, R., Yang, P., Gopalan, K.: Sparc: a security and privacy aware virtual machinecheckpointing mechanism. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, pp. 115–124. ACM (2011)
Jin, S., Ahn, J., Cha, S., Huh, J.: Architectural support for secure virtualization under a vulnerable hypervisor. In: Proceedings of the 44th Annual IEEE/ACM International Symposium on Microarchitecture, pp. 272–283. ACM (2011)
Ibrahim, A.S., Hamlyn-harris, J.H., Grundy, J.: Emerging security challenges of cloud virtual infrastructure (2010)
Reuben, J.S.: A survey on virtual machine security. Helsinki University of Technology (2007)
Khan, R.H., Ylitalo, J., Ahmed, A.S.: Openid authentication as a service in openstack. In: 2011 7th International Conference on Information Assurance and Security (IAS), pp. 372–377. IEEE (2011)
Rueda, S., Sreenivasan, Y., Jaeger, T.: Flexible security configuration for virtual machines. In: Proceedings of the 2nd ACM Workshop on Computer Security Architectures, pp. 35–44. ACM (2008)
Wang, Z., Jiang, X.: Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 380–395. IEEE (2010)
Pelleg, D., Ben-Yehuda, M., Harper, R., Spainhower, L., Adeshiyan, T.: Vigilant–out-of-band detection of failures in virtual machines. Operating Systems Review 42(1), 26 (2008)
Lombardi, F., Di Pietro, R.: Secure virtualization for cloud computing. Journal of Network and Computer Applications 34(4), 1113–1122 (2011)
Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 91–96. ACM (2009)
Zhou, W., Ning, P., Zhang, X., Ammons, G., Wang, R., Bala, V.: Always up-to-date: scalable offline patching of vm images in a compute cloud. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 377–386. ACM (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Kazim, M., Masood, R., Shibli, M.A., Abbasi, A.G. (2013). Security Aspects of Virtualization in Cloud Computing. In: Saeed, K., Chaki, R., Cortesi, A., Wierzchoń, S. (eds) Computer Information Systems and Industrial Management. CISIM 2013. Lecture Notes in Computer Science, vol 8104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40925-7_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-40925-7_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40924-0
Online ISBN: 978-3-642-40925-7
eBook Packages: Computer ScienceComputer Science (R0)