Abstract
Cloud Computing is being a computation resources platform where it is possible to make up an environment flexible and scalable able to host any kind of services. In Cloud Computing, virtualization technologies provide all the needful capabilities to deploy services and run applications in an easy way. Furthermore, large-scale cross border virtualization infrastructures present promising landscape to cope with the ever increasing requirements of modern scientific and business applications.
The large-scale cross border virtualization infrastructures can be seen as a federation of heterogeneous clouds. We present pragmatic analysis of the potential threats posed to the emerging large-scale cross border virtualization infrastructures. We have taken into consideration both internal and external threats to these infrastructures. We also drive the discussion considering a real model of cloud. In particular an infrastructure cloud is briefly presented; a useful scenario where to assess security threats and apply security solutions, that is the European Project, RESERVOIR.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Amazon Web Services: Overview of Security Processes, http://s3.amazonaws.com/aws_blog/AWS_Security_Whitepaper_2008_09.pdf
Comprehensive review of security and vulnerability protections for Google Apps, http://www.google.com/a/help/intl/en/admins/pdf/ds_gsa_apps_whitepaper_0207.pdf
Juan Caceres, R.M., Rochwerger, B.: Reservoir: An architecture for services, the first issue of the reservoir architecture document (June 2008), http://www.reservoir-fp7.eu/twiki/pub/Reservoir/Year1Deliverables/080531-ReservoirArchitectureSpec-1.0.PDF
Dolev, D., Yao, A.C.: On the Security of Public Key Protocols. In: Proceedings of the IEEE 22nd Annual Symposium on Foundations of Computer Science, pp. 350–357 (1982)
Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud Computing and Grid Computing 360-Degree Compared. In: Grid Computing Environments Workshop, GCE 2008, November 2008, pp. 1–10 (2008)
King, S.T., Chen, P.M., Wang, Y., Verbowski, C., Wang, H.J., Lorch, J.R.: Subvirt: Implementing malware with virtual machines. In: SP 2006: Proceedings of the 2006 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 314–327. IEEE Computer Society, Los Alamitos (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
About this paper
Cite this paper
Massonet, P., Naqvi, S., Tusa, F., Villari, M., Latanicki, J. (2010). Mitigating Security Threats to Large-Scale Cross Border Virtualization Infrastructures. In: Avresky, D.R., Diaz, M., Bode, A., Ciciani, B., Dekel, E. (eds) Cloud Computing. CloudComp 2009. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, vol 34. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12636-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-12636-9_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12635-2
Online ISBN: 978-3-642-12636-9
eBook Packages: Computer ScienceComputer Science (R0)