Abstract
Virtual machine infrastructure has been one of the most powerful technologies over the years. In the mid of its growing popularity in the market, there lies a fear in using this technology. Various survey papers discussed the security issues concerning this technology, for instance, the attack at the Virtualization level, man-in-the-middle attacks, denial of service (DoS). In our paper, we discussed various security issues which can occur when we use an application in a virtualized environment. Those issues can be related to the physical machine, in which the virtualized environment is being set up. Attackers can also gain access to the hypervisor which acts as an interface between the virtual machines and the host machine. Security threats can also come up when we login into an application in a virtual machine. Those issues can be related to the login credentials, the data which is to be transferred to the destination system and last but by no means the least, the vulnerabilities of the virtual machines, through which an attacker can gain access to the hypervisor, which is the heart of the virtualized environment. Hence, it is imperative that we do some survey on how we can implement the measures by which we can minimize these security threats and counter the same.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Loganayagi, B., Sujatha, S.: Creating virtual platform for cloud computing. In: The Proceedings of IEEE International Conference on Computational Intelligence and Computing Research (ICCIC 2010), pp. 1–4, 28–29 Dec 2010
Sun, D., Chang, G., Guo, Q., Wang, C., Wang, X.: A dependability model to enhance security of cloud environment using system-level virtualization techniques. In: The Proceedings of First International Conference on Pervasive Computing, Signal Processing and Applications (PCSPA), pp. 305–310 (2010)
Princess, J.P., Paulraj, G.J.L., Jebadurai, I.J.: Methods to mitigate attacks during live migration of virtual machines—a survey. Int. J. Pure Appl. Math. 118(20), 3663–3670 (2018)
Rekha, G.S.: A study on virtualization and virtual machines. Int. J. Eng. Sci. Invention (IJESI). 7(5), 51–55 (2018)
Sahana, S., Bose, R., Sarddar, D.: An enhanced search optimization protocol based on gossip protocol for the cloud. Int. J. Appl. Eng. Res. 12(19), 8436–8442 (2017). ISSN 0973–4562
Althobaiti, A.F.S.: Analyzing security threats to virtual machines monitor in cloud computing environment. J. Inf. Secur. 8, 1–7 (2017)
Sahana, S., Bose, R., Sarddar, D.: Server utilization based smart temperature monitoring system for cloud data center. In: The Proceedings of International Conference on Industry Interactive Innovations in Science, Engineering and Technology. Lecture Notes in Networks and Systems 11. Published on 24–25 Oct 2016. https://doi.org/10.1007/978-981-10-3953-9_30
Prashanthi, M.: Analysis of security issues in virtualization cloud computing. Int. J. Comput. Sci. Mobile Comput. IJCSMC 5(8), 274–281 (2016)
Bose, R., Sahana, S., Sarddar, D.: An adaptive cloud communication network using VSAT with enhanced security implementation. In: The Proceedings of International Conference on Intelligent Computing and Communication 2016 (ICIC2 2016) on 18th and 19th Feb 2016. https://doi.org/10.1007/978-981-10-2035-3_13
Sahana, S., Bose, R., Sarddar, D.: Harnessing RAID mechanism for enhancement of Data Storage and Security on Cloud. Braz. J. Sci. Technol. 3, 12 (2016). https://doi.org/10.1186/s40552-016-0024-5
Tayab, A., Talib, W., Fuzail, M.: Security challenges for virtualization in cloud. University of Engineering and Technology (UET) Taxila, Pakistan, Tech. J. 20(3), (2015)
Divyambika, R., Umamakeswari, A.: Protection of virtual machines during live migration in cloud environment. Indian J. Sci. Technol. 8(S9), 333–339 (2015)
Ahamed, F., Shahrestani, S., Javadi, B.: Developing security profile for virtual machines to ensure secured consolidation: conceptual model. In: The Proceedings of the 13th Australasian Symposium on Parallel and Distributed Computing (AusPDC 2015), Sydney, Australia, 27–30 Jan. 2015
Phalguna Krishna, E.S., Sandhya, E., Ganesh Karthik, M.: Managing DDoS attacks on virtual machines by segregated policy management. Glob. J. Comput. Sci. Technol. E Netw. Web Secur. 14(6), 2014
Bhardwaj, G., Sharma, P., Sharma, G.: Virtualization as an opportunity and a threat. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(2), 2014
Poore, J., Flores, J.C., Atkison, T.: Evolution of digital forensics in virtualization by using virtual machine introspection. ACMSE’13, 4–6 April 2013, Savannah, GA, USA. ACM (2013). 978-1-4503-1901-0/13/04
Ibrahim, A.S., Hamlyn-Harris, J., Grundy, J.: Emerging security challenges of cloud virtual infrastructure. In: The Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30 Nov 2010
Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. CCSW’09, Chicago, Illinois, USA. ACM, 13 Nov 2009. 978-1-60558-784-4/09/11
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mukherjee, T., Sahana, S., Sarddar, D. (2020). A Noble Approach Toward Security Implementation in Cloud Virtualization Framework. In: Kundu, S., Acharya, U.S., De, C.K., Mukherjee, S. (eds) Proceedings of the 2nd International Conference on Communication, Devices and Computing. ICCDC 2019. Lecture Notes in Electrical Engineering, vol 602. Springer, Singapore. https://doi.org/10.1007/978-981-15-0829-5_52
Download citation
DOI: https://doi.org/10.1007/978-981-15-0829-5_52
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0828-8
Online ISBN: 978-981-15-0829-5
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)