Skip to main content

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 350))

  • 774 Accesses

Abstract

Virtualization, the process of allowing efficient utilization of physical computer hardware, is the core of many new technologies. With this comes the importance of understanding the related security aspects to avoid the compromise of underlying resources and services. In this paper, we provide an overview on the two main virtualization architectures and the different types of virtualization approaches related to those architectures. We also review the literature for virtualization security requirements and security attacks. We highlight the latest security techniques proposed in the literature. Due to the growth of cloud computing in the industry, we also discuss virtualization security in the industry. As a result, we have found that the gap between academia and industry has become very small in this field, and more importance should be given to client and service provider responsibility awareness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Yu FR, Liu J, He Y, Si P, Zhang Y (2018) Virtualization for distributed ledger technology (vdlt). IEEE Access 6:25019–25028

    Google Scholar 

  2. Sierra-Arriaga F, Branco R, Lee B (2020) Security issues and challenges for virtualization technologies. ACM Comput Surv 53(2):1–37

    Article  Google Scholar 

  3. Kazim M, Masood R, Shibli MA, Abbasi AG (2013) Security aspects of virtualization in cloud computting. In: IFIP international conference on computer information systems and industrial management. Springer, pp 229–240

    Google Scholar 

  4. Szefer J, Keller E, Lee RB, Rexford J (2011) Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM conference on computer and communications security, pp 401–412

    Google Scholar 

  5. Szefer J, Lee RB (2011) A case for hardware protection of guest vms from compromised hypervisors in cloud computing. In: 2011 31st international conference on distributed computing systems workshops. IEEE, pp 248–252

    Google Scholar 

  6. Souppaya MP, Scarfone K, Hoffman P (2011) Guide to security for full virtualization technologies

    Google Scholar 

  7. Sabahi F (2012) Secure virtualization technology. Int J Comput Theory Eng 4(5):826

    Google Scholar 

  8. Gofman MI, Luo R, Yang P, Gopalan K (2011) Sparc: a security and privacy aware virtual machine check- pointing mechanism. In: Proceedings of the 10th annual ACM workshop on privacy in the electronic society, pp 115–124

    Google Scholar 

  9. Jin S, Ahn J, Cha S, Huh J (2011) Architectural support for secure virtualization under a vulnerable hypervisor. In: 2011 44th annual IEEE/ACM international symposium on microarchitecture (MICRO). IEEE, 272–283

    Google Scholar 

  10. Ibrahim AS, Hamlyn-Harris J, Grundy J (2016) Emerging security challenges of cloud virtual infrastructure, arXiv preprint arXiv:1612.09059

  11. Compasti´e M, Badonnel R, Festor O, He R (2020) From virtualization security issues to cloud protection opportunities: an in-depth analysis of system virtualization models. Comput Secur 97:101905

    Google Scholar 

  12. Patil R, Modi C (2019) An exhaustive survey on security concerns and solutions at different components of virtualization. ACM Comput Surv (CSUR) 52(1):1–38

    Article  Google Scholar 

  13. Reuben JS (2007) A survey on virtual machine security. Helsinki Univ Technol 2(36)

    Google Scholar 

  14. Chen L, Xian M, Liu J, Wang H (2020) Research on virtualization security in cloud computing. In: IOP conference series: materials science and engineering, vol 806(1). IOP Publishing, p 012027

    Google Scholar 

  15. Devi K, S G, R D (2018) Virtualization in cloud computing. IJARCCE 7(11):104–108

    Google Scholar 

  16. Wang Z, Jiang X (2010) Hypersafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: 2010 IEEE symposium on security and privacy. IEEE, 380–395

    Google Scholar 

  17. Pelleg D, Ben-Yehuda M, Harper R, Spainhower L, Adeshiyan T (2008) Vigilant: out-of-band detection of failures in virtual machines. ACM SIGOPS Operati Syst Rev 42(1):26–31

    Article  Google Scholar 

  18. Lombardi F, Di Pietro R (2011) Secure virtualization for cloud computing. J Netw Comput Appl 34(4):1113–1122

    Article  Google Scholar 

  19. Wei J, Zhang X, Ammons G, Bala V, Ning P (2009) Managing security of virtual machine images in a cloud environment. In: Proceedings of the 2009 ACM workshop on Cloud computing security, pp 91–96

    Google Scholar 

  20. Zhou W, Ning P, Zhang X, Ammons G, Wang R, Bala V (2010) Always up-to-date: scalable offline patching of vm images in a compute cloud. In: Proceedings of the 26th annual computer security applications conference, pp 377–386

    Google Scholar 

  21. Tank DM, Aggarwal A, Chaubey NK (2021) Cyber security aspects of virtualization in cloud computing environments: analyzing virtualization-specific cyber security risks. In: Research anthology on privatizing and securing data. IGI Global, pp 1658–1671

    Google Scholar 

  22. Tank D, Aggarwal A, Chaubey N (2019) Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison. Int J Inf Technol 1–16

    Google Scholar 

  23. “MITRE ATTCK®.” [Online]. Available: https://attack.mitre.org/

  24. Elsadig Abdalla Abdalla M (2020) Virtualization security issues: security issues arise in the virtual environment

    Google Scholar 

  25. Cueva-Parra L, Sahinoglu M (2009) Security metrics on cloud computing using statistical simulation and Markov process. In: 12th SDPS transdisciplinary conference proceedings on integrated systems, design and process science, Montgomery, Alabama

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sohail Abbas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Al Zoubi, R., Mahfood, B., Abbas, S. (2022). Security Issues and Defenses in Virtualization. In: Ullah, A., Anwar, S., Rocha, Á., Gill, S. (eds) Proceedings of International Conference on Information Technology and Applications. Lecture Notes in Networks and Systems, vol 350. Springer, Singapore. https://doi.org/10.1007/978-981-16-7618-5_52

Download citation

Publish with us

Policies and ethics