A Survey on Virtual Machine Security

نویسنده

  • Jenni Susan Reuben
چکیده

Virtualization plays a major role in helping the organizations to reduce the operational cost, and still ensuring improved efficiency, better utilization and flexibility of existing hardware. "Virtualization is both an opportunity and a threat says Patrick Lin, Senior director of Product Management for VMware" [4]. This paper presents a literature study on various security issues in virtualization technologies. Our study focus mainly on some open security vulnerabilities that virtualization brings to the environment. We concentrate on security issues that are unique for virtual machines. The security threats presented here are common to all the virtualization technologies available in the market, they are not specific to a single virtualization technology. We provide an overview of various virtualization technologies available in the market at the first place together with some security benefits that comes together with virtualization. Finally we provide a detailed discussion of several security holes in the virtualized environment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing the Virtual Machines

Cloud Computing provides the computer resources in an effective manner. Security in cloud is one of the major drawbacks. Among many security issues in cloud, the Virtual Machine Security is one of the very serious issues.Thus, monitoring of virtual machine is essential. The survey includes various existing Virtual Machine security problems and also many different architectural solutions to over...

متن کامل

A Survey on Cloud Security and Various Attacks on Cloud

Cloud computing provides a means to store and process data through a collection of resources which can be accessed online. Cloud is a collection of storage and physical machines which are termed as datacenter. Cloud consists of many datacenters located at geographically different places. Every physical machine of datacenter can handle more than one user. Virtualization is the technology behind ...

متن کامل

Live Migration of Virtual Machine in Cloud: Survey of Issues and Solutions

Cloud computing is a technology that is built on the theory of virtualizationthe idea to allow multiple virtual machines to share the resources of a host. One of the features of virtualization is live migration. This feature will allow one or more virtual machines to be migrated from one host to another without interfering with applications running on those virtual machines. However, there are ...

متن کامل

A Survey on Techniques of Secure Live Migration of Virtual Machine

Live migration is an essential feature of virtualization that allows transfer of virtual machine from one physical server to another without interrupting the services running in virtual machine. Live migration facilitates workload balancing, fault tolerance, online system maintenance, consolidation of virtual machines etc. Unfortunately the disclosed vulnerabilities with the live migration pose...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

CMPS223 Final Project Virtual Machine Introspection Techniques

This work is a survey of Virtual Machine (VM) introspection, a necessary tool when utilizing VMs for security purposes. In the the rest of this section, we discuss traditional techniques for dealing with malware and the appeals of using a VM in a security context. In Section 2, we outline the main problem for using VMs for security called the semantic gap. In Section 3, we analyze 3 related app...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007