Emerging Security Challenges of Cloud Virtual Infrastructure
نویسندگان
چکیده
The cloud computing model transforming the IT landscape. Cloud computing is a new computing paradigm that delivers computing resources as a set of reliable and scalable internet allowing customers to remotely run and manage these services. Infrastructure-as-a-service (IaaS) is one of the popular cloud computing services. IaaS allows customers to increase their computing resources on the fly without investing in new hardware. IaaS adapts virtualization to enable on-demand access to a pool of virtual computing resources. Although there are great benefits from cloud computing, cloud computing categories of threats to be introduced. These threats are a result of the cloud virtual infrastructure complexity created by the adoption of the virtualization technology. Breaching the security of any component in the cloud virtual infrastructure significantly impacts on the security of other components and consequently affects the overall system security. This paper explores the security problem of the cloud platform virtual infrastructure existing security threats and the complexities of this virtual infrastructure. The paper also discusses the existing security approaches to secure the cloud virtual infrastructure and their drawbacks. Fin and explore some key research challenges of implementing new virtualization-aware security solutions that can provide the pre-emptive protection for complex and ever dynamic cloud virtual infrastructure. Keyword —: cloud computing, cloud virtual infrastructure security, virtualization security
منابع مشابه
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملA Study on Cloud Security Issues and Challenges
Cloud computing is one of the today’s most exciting technology because of its cost-reducing associated with computing while increasing flexibility and scalability for computer processes. In the past few years, cloud computing has growing from being a promising business idea to one of the fastest growing parts of the IT industry. Even there are great benefits to be gained from cloud computing, i...
متن کاملSecuring Virtual Service Generation on the Network: Adapting Digital Rights Management to Cloud-Delivered Media
This work introduces a novel content protection security framework within the virtual Set-Top Box (vSTB) concept. This concept presents a fundamental change in the creation and delivery of media services such as IP Television, by shifting most of the STB’s service execution environment to a network infrastructure. This shift enables a so-called cloud-based rendering of the User Interface and th...
متن کاملHypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations
Cloud Computing is an emerging model of computing where users can leverage the computing infrastructure as a service stack or commodity. The security and privacy concerns of this infrastructure arising from the large co-location of tenants are, however, significant and pose considerable challenges in its widespread deployment. The current work addresses one aspect of the security problem by fac...
متن کاملStudy of Latest Emerging Trends on Cyber Security and its challenges to Society
Cyber Security plays an important role in the development of information technology as well as Internet services. Our attention is usually drawn on “Cyber Security” when we hear about “Cyber Crimes”. Our first thought on “National Cyber Security” therefore starts on how good is our infrastructure for handling “Cyber Crimes” [1]. This paper focus on cyber security emerging trends while adopting ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1612.09059 شماره
صفحات -
تاریخ انتشار 2010