Securing the Virtual Infrastructure in the IaaS Cloud Computing Model

نویسنده

  • Amani S. Ibrahim
چکیده

....................................................................................................................................... II Acknowledgements ...................................................................................................................... IV Declaration ................................................................................................................................... V List of Publications ...................................................................................................................... VI List of Figures .............................................................................................................................. XI List of Tables .............................................................................................................................XIV Introduction ............................................................................................................ 1 Chapter 1 1.1 Research Background and Motivation ................................................................................1 Virtualization-Related Technical Problems ....................................................................2 1.1.1 Operating System Security-Related Technical Problems ...............................................4 1.1.2 1.2 Key Research Contributions ...............................................................................................6 1.3 Thesis Outline .....................................................................................................................8 The IaaS Security Problem ................................................................................... 11 Chapter 2 2.1 Cloud Computing .............................................................................................................11 2.2 The Virtualization Double-Edged Sword .........................................................................13 Virtualization Benefits .................................................................................................14 2.2.1 The Downside: Virtualization Security Risks ..............................................................17 2.2.2 Virtual Machine Security .............................................................................................18 2.2.3 2.3 Operating Systems and the “Pointer Problem” .................................................................24 2.4 Points-to Analysis .............................................................................................................27 2.5 Summary ..........................................................................................................................32 Literature Review ................................................................................................. 33 Chapter 3 3.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Emerging Security Challenges of Cloud Virtual Infrastructure

The cloud computing model transforming the IT landscape. Cloud computing is a new computing paradigm that delivers computing resources as a set of reliable and scalable internet allowing customers to remotely run and manage these services. Infrastructure-as-a-service (IaaS) is one of the popular cloud computing services. IaaS allows customers to increase their computing resources on the fly wit...

متن کامل

An Empherical Research on Open - Source IaaS Cloud Framework

Infrastructure-as-a-Service (IaaS) is the most acceptable Cloud computing delivery model that IT managers are exploring as they relook at their IT infrastructure. Since the beginning of Cloud computing as a new and emerging paradigm, the field of Distributed Systems is amidst a stage of redefinition. Due to this, there are a wide variety of Cloud solutions, ranging from virtualization technolog...

متن کامل

A Method for Measuring Energy Consumption in IaaS Cloud

The ability to measure the energy consumed by cloud infrastructure is a crucial step towards the development of energy efficiency policies in the cloud infrastructure. There are hardware-based and software-based methods of measuring energy usage in cloud infrastructure. However, most hardware-based energy measurement methods measure the energy consumed system-wide - including the energy lost in...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

Task Scheduling Algorithm Using Covariance Matrix Adaptation Evolution Strategy (CMA-ES) in Cloud Computing

The cloud computing is considered as a computational model which provides the uses requests with resources upon any demand and needs.The need for planning the scheduling of the user's jobs has emerged as an important challenge in the field of cloud computing. It is mainly due to several reasons, including ever-increasing advancements of information technology and an increase of applications and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014