Sarfraz Brohi
Identifying and analyzing security threats to virtualized cloud computing infrastructures
Brohi, Sarfraz; Bamiah, Mervat Adib; Brohi, Muhammad Nawaz; Kamran, Rukshanda
Authors
Mervat Adib Bamiah
Muhammad Nawaz Brohi
Rukshanda Kamran
Abstract
A multi-tenant Cloud Computing Infrastructure (CCI) consists of several Virtual Machines (VMs) running on same physical platform by using virtualization techniques. The VMs are monitored and managed by kernel based software i.e. Virtual Machine Monitor (VMM) or hypervisor which is main component of Virtualized Cloud Computing Infrastructure (VCCI). Due to software based vulnerabilities, VMMs are compromised to security attacks that may take place from inside or outside attackers. In order to formulate a secure VCCI, VMM must be protected by implementing strong security tools and techniques such as Encryption and Key Management (EKM), Access Control Mechanisms (ACMs), Intrusion Detection Tools (IDTs), Virtual Trusted Platform Module (vTPM), Virtual Firewalls (VFs) and Trusted Virtual Domains (TVDs). In this research paper we describe the techniques of virtualizing a CCI, types of attacks on VCCI, vulnerabilities of VMMs and we critically describe the significance of security tools and techniques for securing a VCCI. © 2012 IEEE.
Citation
Brohi, S., Bamiah, M. A., Brohi, M. N., & Kamran, R. (2012). Identifying and analyzing security threats to virtualized cloud computing infrastructures. In 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM) (151-155). https://doi.org/10.1109/ICCCTAM.2012.6488089
Conference Name | Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012 |
---|---|
Conference Location | Dubai, United Arab Emirates |
Start Date | Dec 8, 2012 |
End Date | Dec 10, 2012 |
Acceptance Date | Nov 20, 2012 |
Publication Date | Dec 1, 2012 |
Deposit Date | Sep 9, 2022 |
Pages | 151-155 |
Book Title | 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM) |
ISBN | 9781467344166 |
DOI | https://doi.org/10.1109/ICCCTAM.2012.6488089 |
Keywords | Virtualization, Virtual Machine Monitor, Attacks and Vulnerabilities, Security Tools and Techniques |
Public URL | https://uwe-repository.worktribe.com/output/9942650 |
Publisher URL | https://ieeexplore.ieee.org/document/6488089 |
Related Public URLs | https://ieeexplore.ieee.org/xpl/conhome/6479729/proceeding |
You might also like
A secure communication protocol for unmanned aerial vehicles
(2021)
Journal Article
UAV’s applications, architecture, security issues and attack scenarios: A survey
(2020)
Book Chapter
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search