Mitigating Security Threats in Virtualized Environments

被引:0
|
作者
Yauri, Bashir Aliyu [1 ]
Abah, Joshua
机构
[1] Kebbi State Univ Sci & Technol Aliero, Dept Comp Sci & Informat Technol, PMB 1144, Aliero, Kebbi State, Nigeria
关键词
Cloud Computing; Hypervisor; Security; Threats; Virtualization; Virtual Machines;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper reviews and provides clarification to the meaning and concept of cloud computing with particular reference to Infrastructure as a Service (IaaS) and its underlying virtualization technologies. The categories of cloud computing and key characteristics of cloud environment are also discussed. A review of virtualization technologies and approaches is presented with key vulnerabilities to security threats and mitigation strategies and countermeasures are also presented. This knowledge is imperative in making virtual Information Technology (IT) environment more secure and robust and can help improve the operational efficiency of Virtual Machines (VMs) in such a manner that organizations can benefit from virtualization technology in particular and the cloud computing systems in general.
引用
收藏
页码:101 / 108
页数:8
相关论文
共 50 条
  • [21] Technical Solutions for Mitigating Security Threats Caused by Health Professionals in Clinical Settings
    Luis Fernandez-Aleman, Jose
    Sanchez Garcia, Ana Belen
    Garcia-Mateos, Gines
    Toval, Ambrosio
    [J]. 2015 37TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2015, : 1389 - 1392
  • [22] Mitigating Security Threats to Large-Scale Cross Border Virtualization Infrastructures
    Massonet, Philippe
    Naqvi, Syed
    Tusa, Francesco
    Villari, Massimo
    Latanicki, Joseph
    [J]. CLOUD COMPUTING, 2010, 34 : 73 - 82
  • [23] Detection and Mitigation of Security Threats Using Virtualized Network Functions in Software-Defined Networks
    Dominguez-Dorado, Manuel
    Calle-Cancho, Jesus
    Galeano-Brajones, Jesus
    Rodriguez-Perez, Francisco-Javier
    Cortes-Polo, David
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (01):
  • [24] Research on Security Threats Using VPN in Zero Trust Environments
    Kim, Eunyoung
    Sohn, Kiwook
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2023, 2024, 14402 : 55 - 66
  • [25] Security Threats in 5G Edge Computing Environments
    Kim, Youngsoo
    Park, Jong Geun
    Lee, Jong-Hoon
    [J]. 11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 905 - 907
  • [26] Life-logging in Smart Environments: Challenges and Security Threats
    Petroulakis, Nikolaos E.
    Askoxylakis, Ioannis G.
    Tryfonas, Theo
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [27] Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments
    Vassilakis, Vassilios
    Panaousis, Emmanouil
    Mouratidis, Haralambos
    [J]. INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2016, 2016, 9895 : 70 - 84
  • [28] A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments
    Quan, John
    Nance, Kara
    Hay, Brian
    [J]. IT PROFESSIONAL, 2011, 13 (03) : 18 - 23
  • [29] Model of data security for mid-range organizations with using the virtualized environments
    Priscakova, Zuzana
    Rabova, Ivana
    [J]. INFORMATICS 2013: PROCEEDINGS OF THE TWELFTH INTERNATIONAL CONFERENCE ON INFORMATICS, 2013, : 61 - 66
  • [30] Recovery for Virtualized Environments
    Cerveira, Frederico
    Barbosa, Raul
    Madeira, Henrique
    Araujo, Filipe
    [J]. 2015 ELEVENTH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC), 2015, : 25 - 36