Abstract
The gap between the deployment costs for the new services, apps and hosting machines with the expected revenue forces the operators to think in the virtualization concept although the heterogeneity in virtualization techniques solutions. While this virtualization architecture came with different challenges like instances isolation in the hardware or software layers, it anticipated many opportunities for fast deployment and resources management. This position paper lists the main challenges starting from tenants’ isolation and hardware trusting for virtualization layer till the software and network mapping issues for virtual instances communication under the softwarization techniques. Moreover, it sums up the directions for this research point in terms of the vision of software and hardware.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ahmad, R.W., Gani, A., Hamid, S.H.A., Shiraz, M., Yousafzai, A., Xia, F.: A survey on virtual machine migration and server consolidation frameworks for clouddata centers. J. Netw. Comput. Appl. 52, 11–25 (2015)
Aguiar, A.D.C.P.D.: On the virtualization of multiprocessed embedded systems. Ph.D. dissertation, Pontifıcia Universidade Catolica do Rio Grande do Sul (2014)
Mijat, R., Nightingale, A.: Virtualization is coming to a platform near you. ARM white paper (2011)
Le Vinh, T., Bouzefrane, S.: Trusted platforms to secure mobile cloud computing. In: The 16th IEEE International Conference, pp. 1096–1103, August 2014
Liang, C., Yu, F.R.: Wireless network virtualization: a survey, some research issues and challenges. IEEE Commun. Surv. Tutor. 17(1), 358–380 (2015)
Jain, R., Paul, S.: Network virtualization and software defined networking for cloud computing: a survey. IEEE Commun. Mag. 51, 24–31 (2013)
Popek, G.J., Goldberg, R.P.: Formal requirements for virtualizable third generation architectures. ACM SIGOPS Oper. Syst. Rev. 17, 412–421 (1974)
VMWare Inc.: Introducing VMware virtual platform. Technical white paper, February 1999
Understanding Full Virtualization, Para-virtualization, and Hardware Assist. VMWre white paper (2007)
Rodriguez-Haro, F., Freitag, F., Navarro, L., et al.: A summary of virtualization techniques. In: The 2012 Iberoamerican Conference on Electronics Engineering and Computer Science, pp. 267–272 (2012)
NFV White Paper: Network Functions Virtualisation, An Introduction, Benefits, Enablers, Challenges & Call for Action, issue 1, October 2013
ETSI GS NFV 002 (V1.2.1): Network Functions Virtualisation (NFV); Architectural Framework, December 2014
ETSI GS NFV 003 (V1.2.1): Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV, December 2014
Mijumbi, R., Serrat, J., Gorricho, J., Bouten, N., De Turck, F., Boutaba, R.: Network function virtualization: state-of-the-art and research challenges. IEEE Commun. Surv. Tutor. PP(99), 1 (2015)
Hu, F., Hao, Q., Bao, K.: A survey on Software-Defined Network (SDN) and OpenFlow: from concept to implementation. IEEE Commun. Surv. Tutor. 16, 2181–2206 (2014)
McKeown, N., Anderson, T., Balakrishnan, H., et al.: OpenFlow: enabling innovation in campus network. ACM SIGCOMM Comput. Commun. Rev. 38, 69–74 (2008)
TPM Main Specification. http://www.trustedcomputinggroup.org/resources/tpm_main_specification
Perez, R., Sailer, R., van Doorn, L., et al.: vTPM: virtualizing the trusted platform module. In: Proceedings of 15th Conference on USENIX Security Symposium, pp. 305–320 (2006)
England, P., Loeser, J.: Para-virtualized TPM sharing. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 119–132. Springer, Heidelberg (2008). doi:10.1007/978-3-540-68979-9_9
Krautheim, F.J., Phatak, D.S., Sherman, A.T.: Private virtual infrastructure: a model for trustworthy utility cloud computing. In: DTIC Document (2010)
Strasser, M., Stamer, H.: A software-based trusted platform module emulator. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 33–47. Springer, Heidelberg (2008). doi:10.1007/978-3-540-68979-9_3
Ibn-Khedher, H., Abd-Elrahman, E., Afifi, H.: Network issues in virtual machine migration. In: ISNCC, IEEE, Hamamet, Tunisia, vol. 1, pp. 1–6, May 2015
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Bouali, L., Abd-Elrahman, E., Afifi, H., Bouzefrane, S., Daoui, M. (2016). Virtualization Techniques: Challenges and Opportunities. In: Boumerdassi, S., Renault, É., Bouzefrane, S. (eds) Mobile, Secure, and Programmable Networking. MSPN 2016. Lecture Notes in Computer Science(), vol 10026. Springer, Cham. https://doi.org/10.1007/978-3-319-50463-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-50463-6_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-50462-9
Online ISBN: 978-3-319-50463-6
eBook Packages: Computer ScienceComputer Science (R0)