Skip to main content

Research Repository

Advanced Search

Identifying and analyzing security threats to virtualized cloud computing infrastructures

Brohi, Sarfraz; Bamiah, Mervat Adib; Brohi, Muhammad Nawaz; Kamran, Rukshanda

Authors

Sarfraz Brohi

Mervat Adib Bamiah

Muhammad Nawaz Brohi

Rukshanda Kamran



Abstract

A multi-tenant Cloud Computing Infrastructure (CCI) consists of several Virtual Machines (VMs) running on same physical platform by using virtualization techniques. The VMs are monitored and managed by kernel based software i.e. Virtual Machine Monitor (VMM) or hypervisor which is main component of Virtualized Cloud Computing Infrastructure (VCCI). Due to software based vulnerabilities, VMMs are compromised to security attacks that may take place from inside or outside attackers. In order to formulate a secure VCCI, VMM must be protected by implementing strong security tools and techniques such as Encryption and Key Management (EKM), Access Control Mechanisms (ACMs), Intrusion Detection Tools (IDTs), Virtual Trusted Platform Module (vTPM), Virtual Firewalls (VFs) and Trusted Virtual Domains (TVDs). In this research paper we describe the techniques of virtualizing a CCI, types of attacks on VCCI, vulnerabilities of VMMs and we critically describe the significance of security tools and techniques for securing a VCCI. © 2012 IEEE.

Citation

Brohi, S., Bamiah, M. A., Brohi, M. N., & Kamran, R. (2012). Identifying and analyzing security threats to virtualized cloud computing infrastructures. In 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM) (151-155). https://doi.org/10.1109/ICCCTAM.2012.6488089

Conference Name Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012
Conference Location Dubai, United Arab Emirates
Start Date Dec 8, 2012
End Date Dec 10, 2012
Acceptance Date Nov 20, 2012
Publication Date Dec 1, 2012
Deposit Date Sep 9, 2022
Pages 151-155
Book Title 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)
ISBN 9781467344166
DOI https://doi.org/10.1109/ICCCTAM.2012.6488089
Keywords Virtualization, Virtual Machine Monitor, Attacks and Vulnerabilities, Security Tools and Techniques
Public URL https://uwe-repository.worktribe.com/output/9942650
Publisher URL https://ieeexplore.ieee.org/document/6488089
Related Public URLs https://ieeexplore.ieee.org/xpl/conhome/6479729/proceeding