Virtualization Technologies and Cloud Security: advantages, issues, and perspectives

07/29/2018
by   Roberto di Pietro, et al.
0

Virtualization technologies allow multiple tenants to share physical resources with a degree of security and isolation that cannot be guaranteed by mere containerization. Further, virtualization allows protected transparent introspection of Virtual Machine activity and content, thus supporting additional control and monitoring. These features provide an explanation, although partial, of why virtualization has been an enabler for the flourishing of cloud services. Nevertheless, security and privacy issues are still present in virtualization technology and hence in Cloud platforms. As an example, even hardware virtualization protection/isolation is far from being perfect and uncircumventable, as recently discovered vulnerabilities show. The objective of this paper is to shed light on current virtualization technology and its evolution from the point of view of security, having as an objective its applications to the Cloud setting.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/14/2022

Cloud Property Graph: Connecting Cloud Security Assessments with Static Code Analysis

In this paper, we present the Cloud Property Graph (CloudPG), which brid...
research
05/21/2019

SvTPM: A Secure and Efficient vTPM in the Cloud

Virtual Trusted Platform Modules (vTPMs) have been widely used in commer...
research
11/25/2014

Detecting fraudulent activity in a cloud using privacy-friendly data aggregates

More users and companies make use of cloud services every day. They all ...
research
01/11/2019

A New Framework of Authentication Over Cloud Computing

The growth of local data annually implies extra charges for the customer...
research
07/17/2020

Overview of Security of Virtual Mobile Networks

5G is enabling different services over the same physical infrastructure ...
research
04/12/2018

MPSM: Multi-prospective PaaS Security Model

Cloud computing has brought a revolution in the field of information tec...
research
07/16/2014

Security of OS-level virtualization technologies: Technical report

The need for flexible, low-overhead virtualization is evident on many fr...

Please sign up or login with your details

Forgot password? Click here to reset