CFP last date
20 May 2024
Reseach Article

Virtualization and their security threats

by Hiteshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 43 - Number 15
Year of Publication: 2012
Authors: Hiteshi
10.5120/6177-8605

Hiteshi . Virtualization and their security threats. International Journal of Computer Applications. 43, 15 ( April 2012), 8-13. DOI=10.5120/6177-8605

@article{ 10.5120/6177-8605,
author = { Hiteshi },
title = { Virtualization and their security threats },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 43 },
number = { 15 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 8-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume43/number15/6177-8605/ },
doi = { 10.5120/6177-8605 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:33:28.336920+05:30
%A Hiteshi
%T Virtualization and their security threats
%J International Journal of Computer Applications
%@ 0975-8887
%V 43
%N 15
%P 8-13
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Few issues in the IT arena are regarded with more interest and passion than virtualization. Virtualization refers to technologies designed to provide a layer of abstraction between computer hardware systems and the software running on them. Here, we are discussing the key concepts of virtualization if you want to implement the virtualization within your environment. Many different vendors have many different virtualization products according to their size of business viz. small, medium or large. In case of server consolidation, many small physical servers are replaced by one larger physical server, to increase the utilization of costly hardware resources such as CPU. In section1, we give introduction to virtualization and their types. Section2 describes application performance using Xen VMM. Section3 describes how we can virtualize datacenter and some of their solutions. In section 4 and 5, we describe some of the security threats and some of the benefits and finally we conclude our discussion.

References
  1. DMTF System Virtualization, Partitioning and Clustering Working Group, "Open Virtualization Format (OVF) Specification, Version 0. 90", April 2008.
  2. M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia, "Above the Clouds: A Berkeley View of Cloud Computing", University of California at Berkeley Technical Report No. UCB/EECS-209-28, February 10 2009.
  3. B-hive, Application Performance Management for VMware Infrastructure, http://www. bhive. net/
  4. J. Matthews, J. Herne, T. Deshane, P. Jablonski, L. Cherian, M. McCabe, "Data Protection and Rapid Recovery From Attack With A Virtual Private File Server and Virtual Machine Appliances", Proceedings of the IASTED International Conference on Communication, Network and Information Security (CNIS 2005), p. 170-181, November 2005.
  5. www. cs. ucla. edu/~kohler/class/aosref/duda99borrowed. pdThesis. UMI Order Number: UMI Order No. GAX95-09398. , University of Washington. (BVT)
  6. R. Perez, L. van Doorn, and R. Sailer, "Virtualization and Hardware-Based Security," IEEE Security & Privacy, vol. 6, no. 5, pp. 24–31, 2008.
  7. B. D. Payne, M. Carbone, M. Sharif, and W. Lee, "Lares: An architecture for secure active monitoring using virtualization," Security and Privacy,IEEE Symposium on, pp. 233–247, 2008.
  8. P. Karger and D. Safford, "I/O for Virtual Machine Monitors: Security and Performance Issues," IEEE Security & Privacy, vol. 6, no. 5, pp. 16–23, 2008.
  9. T. Ormandy, "An empirical study into the security exposure to host of hostile virtualized environments," in CanSecWest 2007, Vancouver BC, April 2007.
  10. NIST, "CVE-2009-1244," http://web. nvd. nist. gov/view/vuln/detail vulnId=CVE-2009-1244, April 2009, retrieved 2009-04-20.
  11. T. Garfinkel and M. Rosenblum, "When virtual is harder than real: Security challenges in virtual machine based computing environments," VMware.
  12. "VMware vCenter Update Manager," www. vmware. com/files/pdf/update manager datasheet. pdf, 2008, product datasheet, Retrieved 2009-04-20.
  13. Waters, John K. "ABC: An Introduction to Virtualization," CIO, March 15, 2008 http://www. cio. com/article/40701/ABC_An_Introduction_to_Virtualization.
  14. van Cleeff A, Pieters W, Wieringa R. Security implications of virtualization: a literature study. In: 2009 International conference on computational science and engineering. IEEE; 2009. p. 353e8.
  15. Kim G. Seven steps to a secure virtual environment. Network Security 2008; 2008(8):14e8.
Index Terms

Computer Science
Information Sciences

Keywords

Virtualization Cloud Computing Security