Extensive Study of Cloud Computing Technologies, Threats and Solutions Prospective (2024)

Related Papers

Virtualization and Security Aspects: An Overview

2020 •

Rui Silva

Virtualization allows a single system to concurrently run multiple isolated virtual machines, operating systems (OSes) or multiple instances of a single OS. It helps organizations to improve operational efficiency, reduce costs, improve the use of hardware, and to allocate resources ondemand. Nevertheless, like most technologies, it has vulnerabilities and threats. Research about security issues related to virtualization has been conducted for several years. However, there are still open challenges related to security in virtualization. This paper looks into some of the differences, issues, challenges, and risks caused by virtualization and aims to classify the various virtualization approaches, along with their goals, advantages and drawbacks from a security perspective. Such classification is expected to help in the identification of virtualization technologies that might be applied in a virtualized infrastructure. This work is intended to be an introduction to the security consid...

View PDF

Survey of Security Problems in Cloud Computing Virtual Machines

2012 •

Mohamed Kaâniche

View PDF

Security aspects of virtualisation

Experience has shown that virtualization can provide a dramatic increase in the efficiency and effectiveness of complex organizations and communities, and is expected to constitute an important technological pillar of a thriving data-driven economy and the European single digital market. However, virtualization also bears a number of (new) security risks. First, some risks are shared with traditional computing environments and include, for instance, issues affecting operating systems, communication protocols, and applications. Second, the above issues may even be exacerbated by the use of virtualized components, producing a greater security impact. For instance, privilege escalation may have increased impact if the target of the escalation is the OS of the physical machine hosting a virtualized system. Finally, virtualization also introduces a number of virtualization-specific security issues that require ad hoc solutions. For instance, new security issues are related to multi-tenancy allowing cross-platform information flow between customers sharing the same physical host, and allowing adversaries to execute arbitrary out-of-the-guest code without owning the required access rights. Nowadays, as the basis of distributed infrastructures like the cloud, virtualized environments are adopted pervasively and therefore increasingly targeted by cyber-attacks. Even more elaborated and specialized attacks are currently being devised to exploit vulnerabilities or weaknesses at the virtualization layer. This report provides an analysis of the status of virtualization security. In it, we present current efforts, emerging best practices and known security gaps, discussing the impact the latter have on environments based on virtualization technologies.

View PDF

SECURITY CONCERN FOR VIRTUALIZATION IN CLOUD COMPUTING

TJPRC Publication

Cloud computing has become known as today's most thrilling computing standard shift in information technology arena. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. The cloud is a virtualization of resources that maintains and manages itself. Cloud can exist without Virtualization, although it is difficult and inefficient. The Virtualization is gaining new goals and attracting those who need to perform the “miracle of multiplication”, as it is to fit more information in less space. [1] Many of the features of virtualization offer both benefits and disadvantages to security. This paper is addressing about the virtualization which is one of the fundamental components of cloud computing, types of virtualization specifically hardware virtualization and its approaches plus virtualization security aspects.

View PDF

International Journal of Advanced Trends in Computer Science and Engineering

Virtualization Security in Cloud Computing-A Survey

2021 •

A. Rafique, Usman Nawaz

Cloud computing at present is the most widely adopted computing paradigm across the globe. One of the core attribute of cloud computing virtualization is considered as selling point of cloud services. However, this cloud-based environment remains prone to hackers and intruders, prompting adverse effects on any computing system. Therefore, security is an important aspect of cloud computing considered as an integral part of virtualization. Paper aims to identify and explore issues transforming into challenges during process of virtualization presented through a survey of published literature. Paper aims to collect data from existing publications and present it in a useful format for fellow researchers to gain insight into this domain and have a comprehensive knowledge from a single paper. We have selected 40 papers to be included after careful analysis from existing literature till date form online digital data bases. We have classified the problems and with solutions in a matrix for ease of readers and help them in better understating our findings. We have also classified several tool and techniques in use of security of virtualization in cloud computing and their pros and cons.

View PDF

2012 Proceedings of IEEE Southeastcon

On state of the art in virtual machine security

2012 •

Abhishek Dubey

View PDF

ACM Computing Surveys

A survey of security issues in hardware virtualization

2013 •

Gabor Pek

Virtualization is a powerful technology for increasing the efficiency of computing services; however, besides its advantages, it also raises a number of security issues. In this article, we provide a thorough survey of those security issues in hardware virtualization. We focus on potential vulnerabilities and existing attacks on various virtualization platforms, but we also briefly sketch some possible countermeasures. To the best of our knowledge, this is the first survey of security issues in hardware virtualization with this level of details. Moreover, the adversary model and the structuring of the attack vectors are original contributions, never published before.

View PDF

Upcoming reserach

P kamal

Security in Multi-tenant Hosting Enviroment

View PDF

2020 •

atif saeed

Cloud computing is a contemporary model in which the computing resources are dynamically scaled-up and scaled-down to customers, hosted within large-scale multi-tenant systems. These resources are delivered as improved, cost-effective and available upon request to customers. As one of the main trends of IT industry in modern ages, cloud computing has extended momentum and started to transform the mode enterprises build and offer IT solutions. The primary motivation in using cloud computing model is cost-effectiveness. These motivations can compel Information and Communication Technologies (ICT) organizations to shift their sensitive data and critical infrastructure on cloud environments. Because of the complex nature of underlying cloud infrastructure, the cloud environments are facing a large number of challenges of misconfigurations, cyber-attacks, root-kits, malware instances etc which manifest themselves as a serious threat to cloud environments. These threats noticeably decline...

View PDF

Virtual Firewall Evaluation System (VFES) in a Private Cloud Platform

Luis Bravo Roldan

hi

View PDF
Extensive Study of Cloud Computing Technologies, Threats and Solutions Prospective (2024)

References

Top Articles
Latest Posts
Article information

Author: Msgr. Refugio Daniel

Last Updated:

Views: 5493

Rating: 4.3 / 5 (54 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Msgr. Refugio Daniel

Birthday: 1999-09-15

Address: 8416 Beatty Center, Derekfort, VA 72092-0500

Phone: +6838967160603

Job: Mining Executive

Hobby: Woodworking, Knitting, Fishing, Coffee roasting, Kayaking, Horseback riding, Kite flying

Introduction: My name is Msgr. Refugio Daniel, I am a fine, precious, encouraging, calm, glamorous, vivacious, friendly person who loves writing and wants to share my knowledge and understanding with you.