Skip to main content

A Noble Approach Toward Security Implementation in Cloud Virtualization Framework

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 602))

Abstract

Virtual machine infrastructure has been one of the most powerful technologies over the years. In the mid of its growing popularity in the market, there lies a fear in using this technology. Various survey papers discussed the security issues concerning this technology, for instance, the attack at the Virtualization level, man-in-the-middle attacks, denial of service (DoS). In our paper, we discussed various security issues which can occur when we use an application in a virtualized environment. Those issues can be related to the physical machine, in which the virtualized environment is being set up. Attackers can also gain access to the hypervisor which acts as an interface between the virtual machines and the host machine. Security threats can also come up when we login into an application in a virtual machine. Those issues can be related to the login credentials, the data which is to be transferred to the destination system and last but by no means the least, the vulnerabilities of the virtual machines, through which an attacker can gain access to the hypervisor, which is the heart of the virtualized environment. Hence, it is imperative that we do some survey on how we can implement the measures by which we can minimize these security threats and counter the same.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Loganayagi, B., Sujatha, S.: Creating virtual platform for cloud computing. In: The Proceedings of IEEE International Conference on Computational Intelligence and Computing Research (ICCIC 2010), pp. 1–4, 28–29 Dec 2010

    Google Scholar 

  2. Sun, D., Chang, G., Guo, Q., Wang, C., Wang, X.: A dependability model to enhance security of cloud environment using system-level virtualization techniques. In: The Proceedings of First International Conference on Pervasive Computing, Signal Processing and Applications (PCSPA), pp. 305–310 (2010)

    Google Scholar 

  3. Princess, J.P., Paulraj, G.J.L., Jebadurai, I.J.: Methods to mitigate attacks during live migration of virtual machines—a survey. Int. J. Pure Appl. Math. 118(20), 3663–3670 (2018)

    Google Scholar 

  4. Rekha, G.S.: A study on virtualization and virtual machines. Int. J. Eng. Sci. Invention (IJESI). 7(5), 51–55 (2018)

    Google Scholar 

  5. Sahana, S., Bose, R., Sarddar, D.: An enhanced search optimization protocol based on gossip protocol for the cloud. Int. J. Appl. Eng. Res. 12(19), 8436–8442 (2017). ISSN 0973–4562

    Google Scholar 

  6. Althobaiti, A.F.S.: Analyzing security threats to virtual machines monitor in cloud computing environment. J. Inf. Secur. 8, 1–7 (2017)

    Google Scholar 

  7. Sahana, S., Bose, R., Sarddar, D.: Server utilization based smart temperature monitoring system for cloud data center. In: The Proceedings of International Conference on Industry Interactive Innovations in Science, Engineering and Technology. Lecture Notes in Networks and Systems 11. Published on 24–25 Oct 2016. https://doi.org/10.1007/978-981-10-3953-9_30

  8. Prashanthi, M.: Analysis of security issues in virtualization cloud computing. Int. J. Comput. Sci. Mobile Comput. IJCSMC 5(8), 274–281 (2016)

    Google Scholar 

  9. Bose, R., Sahana, S., Sarddar, D.: An adaptive cloud communication network using VSAT with enhanced security implementation. In: The Proceedings of International Conference on Intelligent Computing and Communication 2016 (ICIC2 2016) on 18th and 19th Feb 2016. https://doi.org/10.1007/978-981-10-2035-3_13

  10. Sahana, S., Bose, R., Sarddar, D.: Harnessing RAID mechanism for enhancement of Data Storage and Security on Cloud. Braz. J. Sci. Technol. 3, 12 (2016). https://doi.org/10.1186/s40552-016-0024-5

    Article  Google Scholar 

  11. Tayab, A., Talib, W., Fuzail, M.: Security challenges for virtualization in cloud. University of Engineering and Technology (UET) Taxila, Pakistan, Tech. J. 20(3), (2015)

    Google Scholar 

  12. Divyambika, R., Umamakeswari, A.: Protection of virtual machines during live migration in cloud environment. Indian J. Sci. Technol. 8(S9), 333–339 (2015)

    Article  Google Scholar 

  13. Ahamed, F., Shahrestani, S., Javadi, B.: Developing security profile for virtual machines to ensure secured consolidation: conceptual model. In: The Proceedings of the 13th Australasian Symposium on Parallel and Distributed Computing (AusPDC 2015), Sydney, Australia, 27–30 Jan. 2015

    Google Scholar 

  14. Phalguna Krishna, E.S., Sandhya, E., Ganesh Karthik, M.: Managing DDoS attacks on virtual machines by segregated policy management. Glob. J. Comput. Sci. Technol. E Netw. Web Secur. 14(6), 2014

    Google Scholar 

  15. Bhardwaj, G., Sharma, P., Sharma, G.: Virtualization as an opportunity and a threat. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(2), 2014

    Google Scholar 

  16. Poore, J., Flores, J.C., Atkison, T.: Evolution of digital forensics in virtualization by using virtual machine introspection. ACMSE’13, 4–6 April 2013, Savannah, GA, USA. ACM (2013). 978-1-4503-1901-0/13/04

    Google Scholar 

  17. Ibrahim, A.S., Hamlyn-Harris, J., Grundy, J.: Emerging security challenges of cloud virtual infrastructure. In: The Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30 Nov 2010

    Google Scholar 

  18. Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. CCSW’09, Chicago, Illinois, USA. ACM, 13 Nov 2009. 978-1-60558-784-4/09/11

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sudipta Sahana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mukherjee, T., Sahana, S., Sarddar, D. (2020). A Noble Approach Toward Security Implementation in Cloud Virtualization Framework. In: Kundu, S., Acharya, U.S., De, C.K., Mukherjee, S. (eds) Proceedings of the 2nd International Conference on Communication, Devices and Computing. ICCDC 2019. Lecture Notes in Electrical Engineering, vol 602. Springer, Singapore. https://doi.org/10.1007/978-981-15-0829-5_52

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0829-5_52

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0828-8

  • Online ISBN: 978-981-15-0829-5

  • eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)

Publish with us

Policies and ethics