Open Access   Article Go Back

A Research on Cloud Computing Challenges in Virtualization and Cloud Environment

Vaibhav Sardana1 , Nidhi Saxena2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-9 , Page no. 226-229, Sep-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i9.226229

Online published on Sep 30, 2019

Copyright © Vaibhav Sardana, Nidhi Saxena . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vaibhav Sardana, Nidhi Saxena, “A Research on Cloud Computing Challenges in Virtualization and Cloud Environment,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.9, pp.226-229, 2019.

MLA Style Citation: Vaibhav Sardana, Nidhi Saxena "A Research on Cloud Computing Challenges in Virtualization and Cloud Environment." International Journal of Computer Sciences and Engineering 7.9 (2019): 226-229.

APA Style Citation: Vaibhav Sardana, Nidhi Saxena, (2019). A Research on Cloud Computing Challenges in Virtualization and Cloud Environment. International Journal of Computer Sciences and Engineering, 7(9), 226-229.

BibTex Style Citation:
@article{Sardana_2019,
author = {Vaibhav Sardana, Nidhi Saxena},
title = {A Research on Cloud Computing Challenges in Virtualization and Cloud Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2019},
volume = {7},
Issue = {9},
month = {9},
year = {2019},
issn = {2347-2693},
pages = {226-229},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4882},
doi = {https://doi.org/10.26438/ijcse/v7i9.226229}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i9.226229}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4882
TI - A Research on Cloud Computing Challenges in Virtualization and Cloud Environment
T2 - International Journal of Computer Sciences and Engineering
AU - Vaibhav Sardana, Nidhi Saxena
PY - 2019
DA - 2019/09/30
PB - IJCSE, Indore, INDIA
SP - 226-229
IS - 9
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
438 1324 downloads 201 downloads
  
  
           

Abstract

Virtualization allows for multiple virtual machines or users to be logically segregated and access simultaneously the same physical machine from remote locations. It enables the cloud characteristics of resource pooling and multi-tenancy. Moreover it introduces the rapid elasticity feature and optimal management of resources. Virtualization supports the cloud in implementing its service and deployment models. Virtual machines can be created, copied and migrated which leads to security challenges. This paper elaborates on virtualization vulnerabilities and presents solutions existing in literature to the security threats.

Key-Words / Index Term

Virtualization, Virtual machine, Challenges, Solutions

References

[1]. M. Gupta, D. Srivastava, D. Chauhan, Security Challenges of Virtualization in Cloud Computing, in: ICTCS`16 proceedings of the Second International Conference on Information & Communication Technology for Competitive strategies, March 04-05, Udaipur, India 2016, dl.acm.org/citation.cfm?id=2905315. http://dx.doi.org/10.1145/2905055.2905315
[2]. M. Ali, S. Khan, A. Vasilakos, Security in cloud computing: Opportunities and challenges, Information Sciences 305 (2015) 357-383.
[3]. Menasce, Daniel A. "Virtualization: Concepts, applications, and performance modeling." In Int. CMG Conference, 2005, pp. 407-414.
[4]. M. Garcia-Valls, T. Cucinotta, C. Lu, Challenges in real-time virtualization and predictable cloud computing, Journal of Systems Architecture 60 (2014) 726-740.
[5]. Gabriel Cephas Obasuyi, Arif Sari "Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment", Int. J. Communications, Network and System sciences, 8, 2015, 260-273.
[6]. Hassan Takabi and James B.D. Joshi, University of Pittsburgh, Gail-Joon and Ahn Arizona State University, "Security and Privacy Challenges in Cloud Computing Environments", IEEE security and privacy, www.computer.org/security, 2010, pp.24-31.
[7]. Mingi Zhou et al., "Security and Privacy in Cloud Computing: A Survey, " Proc. 6th Int`l Conf. Semantics, Knowledge and Grids, IEEE Press, 2010, pp. 105-112.
[8]. Kresimir Popovic and Zeljko Hocenski, "Cloud Computing Security Issues and Challenges, " Proc. 33rd Int`l Convention on Information and Comm. Technology, Electronics and Microelectronics (MIPRO 10), IEEE Press, 2010, pp. 344-349.
[9]. Kui Ren, Cong Wang, and Qian Wang, Ilnois Institute of Technology, "Security Challenges for the Public Cloud", IEEE Press, 2012, pp. 69-73.
[10]. Hsin-Yi Tsai, Melanie Siebenhaar and Andre Miede, Yu-Lun Huang, Ralf Steinmetz, "Threat as a Service?Virtualization`s impact on Cloud Security", IEEE, IT Pro, 2012, pp: 32-37.
[11]. Flavio Lombardi & Roberto Di Pietro, "Transparent Security for Cloud", SAC`10 March 22-26, 2010, Sierre, Switzerland.
[12]. Maneesha Sharma, Himani Bhansal and Amit Kumar Sharma, "Cloud Computing Different Approach & Security Challenge", In International Journal of Soft Computing and Engineering (IJSCE), Vol. 2, 2012, pp. 421-424.
[13]. Yanpei Chen, Vern Paxson and Randy H. Katz, "What`s New About Cloud Computing Security?", Technical Report No. UCB/EECS-2010-5.
[14]. T. Ristenpart et al.., "Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds," Proc. 16th ACM conf. Computer and Communications Security (CCS09), ACM Press, 2009, pp. 199-212.
[15]. B. Grobauer, T. Walloscheck, and E. Stocher. "Understanding Cloud-Computing Vulnerabilities," IEEE Security and Privacy, vol. 9, no. 2, 2011, pp. 50-57.
[16]. M. A. Morsy, J. Grundy, and I. Muller, "An Analysis of the Cloud Computing Security Problem," Proc. 17th Asia Pacific Software Eng. Conf. 2010 Cloud Workshop (APSEC 10), IEEE Press, 2010.
[17]. Y. Neng-Hai, Z. Hao, J. Xu, W. Zhang, C. Zhang, Review of cloud computing security, Acta Electron, Sinica 41 (2) (2013) 371-381.
[18]. K. Ren, C. Wang, Q.Wang, Security challenges for the public cloud, IEEE Internet Comput. 16 (1) (2012) 69-73.
[19]. K. Hashizume, D.G. Rosado, E. Fernndez-Medina, E.B. Fernandez, An analysis of security issues for cloud computing, J. Internet Services Appl. 4 (1) (2013) 1-13.
[20]. W.A. Jansen, Cloud hooks: Security and privacy issues in cloud computing, in: 44th Hawaii International Conference on System Sciences (HICSS), 2011, pp 1-10.
[21]. N. Gonzalez, C. Miers, F. Redgolo, M. Simplcio, T. Carvalho, M. Nslund, M. Pourzandi, A quantitative analysis of current security concerns and solutions for cloud computing, J. Cloud Comput. 1 (1) (2012) 1-18.
[22]. S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, J. Netw. Comput. Appl. 34 (1) (2011) 1-11.
[23]. M.H. Song, Analysis of risks for virtualization technology, in: Applied Mechanics and Materials, vol. 539, 2014, pp. 374-377.
[24]. S.H. Na, E.N. Huh, A broker-based cooperative security-SLA evaluation methodology for personal cloud computing, Sec. Commun. Netw. (2014), http://dx.doi.org/10.1002/sec.1086.
[25]. F. Zhang, H. Chen, Security preserving live migration of virtual machines in the cloud, J. Netw. Syst. Manage. 21 (4) (2013) 562-587.
[26]. A. Corradi, M. Fanelli, L. Foschini, VM consolidation: a real case based on openstack cloud, Future Gener. Comput. Syst. 32 (2014) 118-127.
[27]. R. Schwarzkopf, M. Schmidt, C. Strack, S. Martin, B. Freisleben, Increasing virtual machine security in cloud environments, J. Cloud Comput. 1 (1) (2012) 1-12.
[28]. H. Wu, Y. Ding, C. Winer, L. Yao, Network security for virtual machine in cloud computing, in: 5th International Conference on Computer Sciences and Convergence Information Technology, 2010, pp. 18-21.
[29]. J. Szefer, E. Keller, R.B. Lee, J. Rexford, Eliminating the hypervisor attack surface for a more secure cloud, in: Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011, pp. 401-412.
[30]. K.S. Rao, P.S. Thilagam, Heuristics based server consolidation with residual resource defragmentation in cloud data centers, Futur Gener. Comput. Syst. (2014), http://dx.doi.org/10.1016/j.future.2014.09.009.
[31]. J. Wei, X. Zhang, G. Ammons, V. Bala, P. Ning, Managing security of virtual machine images in a cloud environment, in: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, 2009, pp. 91-96.
[32]. F. Zhang, J. Chen, H. Chen, B. Zang, Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization, in: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, 2011, pp. 203-216.
[33]. M. Aslam, C. Gehrmann, M. Bjorkman, Security and trust preserving VM migrations in public clouds, in: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 869-876.
[34]. F. Zhang, J. Wang, K. Sun, A. Stavrou, HyperCheck: a hardware-assisted integrity monitor, IEEE Trans. Denpendable Sec. Comput. (2013), http://dx.doi.org/10.1109/TDSC.2013.53.
[35]. Y. Xia, Y. Liu, H. Chen, B. Zang, Defending against VM rollback attack, in: IEEE/IFIP 42nd International Conference on Dependable Systems and Networks Workshops, 2012, pp. 1-5.
[36]. Y. Xia, Y. Liu, H. Chen, Architecture support for guest- transparent VM protection from untrusted hypervisor and physical attacks, in: IEEE 19th International Symposium on High Performance Computer Architecture, 2013, pp. 246-257.
[37]. Srivastava, H. Raj, J. Gi_n, P. England, Trusted VM snapshots in untrusted cloud infrastructures, in: Research in Attacks, Intrusion and Defenses, Springer, Berlin, Heidelberg, 2012, pp. 1-21.
[38]. M. I. Gofman, R.Luo, P. Yang, K. Gopalan, Sparc: a security and privacy aware virtual machine check pointing mechanism, in: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, 2011, pp. 115-124.
[39]. Y. Hu, T. Li, P. Yang, K. Gopalan, An application-level approach for privacy-preserving virtual machine checkpointing, in: IEEE Sixth International Conference on Cloud Computing, 2013, pp. 59-66.