Advertisement

Security Threats and Solutions for Virtualization and Migration in Virtual Machines

  • N. Ravi
  • N. R. Sunitha
Conference paper

Abstract

Cloud has been a dominant player in information technology in the recent years. The main composing factor of cloud is virtualization among many others. Due to the widespread acceptance of cloud, the researchers have identified that the area is a favorable habitat for the attacks. The attacks and threats always have poured gloomy clouds on the user raising the concern about their privacy and security. The virtualization technology dates back to the advent of mainframe computers and has been the area of refinement over the years. Since the cloud is built on obsolete virtualization technology, it eases the combination of attack pattern for the malicious user. Also, the migration of virtual machine (VM) holds key status in the effective management of data centers. As the virtualization technology imbibed on cloud is obsolete, the migration technique is also prone to attack and ineffective management. This paper discusses the threats and associated attacks pertaining to virtualization and migration in VM and proposes a new framework which will enhance the security of virtualized environment. The proposed framework handles the migration of VM in an effective manner.

Keywords

Virtualization Virtual Machine (VM) DASDVM Security threats Migration Cloud computing threats SLA 

References

  1. 1.
    Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015). https://doi.org/10.1016/j.ins.2015.01.025
  2. 2.
    Aslam, M., Gehrmann, C., Bjorkman, M.: Security and trust preserving VM migrations in public clouds. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE (2012).  https://doi.org/10.1109/trustcom.2012.256
  3. 3.
    Bahulikar, S.: Security measures for the big data, virtualization and the cloud infrastructure. In: 2016 1st India International Conference on Information Processing (IICIP). IEEE (2016).  https://doi.org/10.1109/iicip.2016.7975336
  4. 4.
    Bauman, E., Ayoade, G., Lin, Z.: A survey on hypervisor-based monitoring. ACM Comput. Surv. 48(1), 1–33 (2015). https://doi.org/10.1145/2775111
  5. 5.
    Fu, Y., Lin, Z.: EXTERIOR. ACM SIGPLAN Notices 48(7), 97 (2013). https://doi.org/10.1145/2517326.2451534
  6. 6.
    Kazim, M., Masood, R., Shibli, M.A.: Securing the virtual machine images in cloud computing. In: Proceedings of the 6th International Conference on Security of Information and Networks - SIN '13. ACM Press (2013). https://doi.org/10.1145/2523514.2523576
  7. 7.
    Khan, M.A.: A survey of security issues for cloud computing. J. Netw. Comput. Appl. 71, 11–29 (2016). https://doi.org/10.1016/j.jnca.2016.05.010
  8. 8.
    Latif, R., Abbas, H., Assar, S., Ali, Q.: Cloud Computing Risk Assessment: A Systematic Literature Review, pp. 285–295. Springer, Berlin (2014). https://doi.org/10.1007/978-3-642-40861-8_42
  9. 9.
    Rawat, S., Tyagi, R., Kumar, P.: An investigative study on challenges of live migration. In: 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE (2016).  https://doi.org/10.1109/icrito.2016.7784939
  10. 10.
    Sabahi, F.: Secure virtualization for cloud environment using hypervisor-based technology. Int. J. Mach. Learn. Comput. 2, 39–45 (2012).  https://doi.org/10.7763/ijmlc.2012.v2.87
  11. 11.
    Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security - CCSW '09. ACM Press (2009). https://doi.org/10.1145/1655008.1655021
  12. 12.
    Xia, Y., Liu, Y., Chen, H.: Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks. In: 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA). IEEE (2013).  https://doi.org/10.1109/hpca.2013.6522323
  13. 13.
    Xiaopeng, G., Sumei, W., Xianqin, C.: Vnss: A network security sandbox for virtual computing environment. In: 2010 IEEE Youth Conference on Information, Computing and Telecommunications, pp. 395–398 (2010)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • N. Ravi
    • 1
  • N. R. Sunitha
    • 1
  1. 1.Department of Computer Science and EngineeringSiddaganga Institute of TechnologyTumakuruIndia

Personalised recommendations