Real Security in Virtual Systems: a Proposed Model for a Comprehensive Approach to Securing Virtualized Environments
نویسندگان
چکیده
Corporate adoption of new server virtualization technologies offered by VMWare, Microsoft, the open source community (Xen) and others raises both new opportunities and new risks for system security. Security issues of virtualization have received some attention in trade periodicals and journals, but a comprehensive and authoritative understanding of virtualized system security under current models of information security has yet to be developed. Such an understanding requires that some fundamental questions be asked: What is the place of virtualized system components in security models as they are currently understood? How should the implementation of virtualization be expected to affect security planning under such models? Our paper presents a first attempt to address these questions. We present an integrated model of system security highlighting the effects of virtualization. We then use this model to analyze security impacts of virtualization within the overall system security context, and present suggestions for further research to formalize security in systems incorporating
منابع مشابه
A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors
Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...
متن کاملA comprehensive common weights data envelopment analysis model: Ideal and anti-ideal virtual decision making units approach
Data envelopment analysis (DEA) calculates the relative efficiency of homogenous decision-making units (DMUs) with multiple inputs and outputs. Classic DEA models usually suffer from several issues such as: discrimination power, variable weights of inputs/outputs, inaccurate efficiency estimation for small number of DMUs, incapability in working with zero and negative data, and not having exter...
متن کاملA combination of semantic and attribute-based access control model for virtual organizations
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...
متن کاملA Multi-objective Optimization Model for Dynamic Virtual Cellular Manufacturing Systems
Companies and firms, nowadays, due to mounting competition and product diversity, seek to apply virtual cellular manufacturing systems to reduce production costs and improve quality of the products. In addition, as a result of rapid advancement of technology and the reduction of product life cycle, production systems have turned towards dynamic production environments. Dynamic cellular manufact...
متن کاملSecure Hypervisors
Nowadays, more and more companies tend to use virtual machines instead of physically separated machines as platform for their IT services. This reduces the hardware costs and also simplifies the management of the IT infrastructure. However, virtualized environments do, in contrast to popular belief, not necessarily increase the security of a system. Actually, virtualized environments face the s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008