Mitigating Security Threats in Virtualized Environments

被引:0
|
作者
Yauri, Bashir Aliyu [1 ]
Abah, Joshua
机构
[1] Kebbi State Univ Sci & Technol Aliero, Dept Comp Sci & Informat Technol, PMB 1144, Aliero, Kebbi State, Nigeria
关键词
Cloud Computing; Hypervisor; Security; Threats; Virtualization; Virtual Machines;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper reviews and provides clarification to the meaning and concept of cloud computing with particular reference to Infrastructure as a Service (IaaS) and its underlying virtualization technologies. The categories of cloud computing and key characteristics of cloud environment are also discussed. A review of virtualization technologies and approaches is presented with key vulnerabilities to security threats and mitigation strategies and countermeasures are also presented. This knowledge is imperative in making virtual Information Technology (IT) environment more secure and robust and can help improve the operational efficiency of Virtual Machines (VMs) in such a manner that organizations can benefit from virtualization technology in particular and the cloud computing systems in general.
引用
收藏
页码:101 / 108
页数:8
相关论文
共 50 条
  • [1] A Security Framework for Improving QoS by Detecting and Mitigating Cache Side-Channel Attacks in Virtualized Environments
    Mahipal, S.
    Sharmila, V. Ceronmani
    [J]. IAENG International Journal of Computer Science, 2023, 50 (02)
  • [2] Mitigating Threats and Security Metrics in Cloud Computing
    Kar, Jayaprakash
    Mishra, Manoj Ranjan
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2016, 12 (02): : 226 - 233
  • [3] Mitigating Threats of Small Vessels to Maritime Security
    Trischitta, Patrick R.
    Salloum, Hady
    Bunin, Barry
    Orton, Philip
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 654 - 659
  • [4] Security Threats and Mitigating Risk for USB Devices
    Tetmeyer, Annette
    Saiedian, Hossein
    [J]. IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2010, 29 (04) : 44 - 49
  • [5] The Ethics of Interaction: Mitigating Security Threats in LLMs
    School of Information, Rochester Institute of Technology, 1 Lomb Memorial Dr, Rochester
    NY
    14623, United States
    [J]. arXiv, 1600,
  • [6] Dynamic Security Monitoring and Accounting for Virtualized Environments
    Munoz, Antonio
    Harjani, Rajesh
    Mana, Antonio
    Diaz, Rodrigo
    [J]. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 : 182 - +
  • [7] Identifying and Analyzing Security Threats to Virtualized Cloud Computing Infrastructures
    Brohi, Sarfraz Nawaz
    Bamiah, Mervat Adib
    Brohi, Muhammad Nawaz
    Kamran, Rukshanda
    [J]. 2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 151 - 155
  • [8] HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments
    Unal, Musa Sadik
    Javeed, Arsalan
    Yilmaz, Cemal
    Savas, Erkay
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2022, 2022, 13641 : 188 - 199
  • [9] Security Threats in Cloud Computing Environments
    Lee, Kangchan
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 25 - 32
  • [10] Mitigating IoT Security Threats with a Trusted Network Element
    Kuusijarvi, Jarkko
    Savola, Reijo
    Savolainen, Pekka
    Evesti, Antti
    [J]. 2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 260 - 265