Skip to main content

A Security Model for Protecting Virtualization in Cloud Computing

  • Conference paper
  • First Online:
Advances in Computer Science and Ubiquitous Computing (UCAWSN 2016, CUTE 2016, CSA 2016)

Abstract

Virtualization is the key component of cloud computing that refers to the abstraction of sharing resources. The basic idea is to implement the virtualization in cloud computing environment because of its flexibility, scalability, its cost-reducing and resource utilization. Instead of many good attributes virtualization still facing with security flaws like availability, mutual authentication, potential attack in the virtual network, DoS attack on virtual servers and storage also. In the paper, we propose a general security model to protect the virtual environment and also discuss the flow of data which is monitored by hypervisors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anand, R., Saraswathi, S., Regan, R.: Security issues in virtualization environment. In: International Conference on Radar Communication and Computing (ICRCC), pp. 254–256, December 2012

    Google Scholar 

  2. Natarajan, S., Wolf, T.: Security issues in network virtualization for the future internet. In: International Conference on Computing, Networking and Communications (ICNC), pp. 537–543. IEEE, January 2012

    Google Scholar 

  3. Sgandurra, D., Lupu, E.: Evolution of attacks, threat models, and solutions for virtualized systems. J. ACM Comput. Surv. (CSUR) 48(3), 46 (2016)

    Google Scholar 

  4. Kedia, P., Nagpal, R., Singh, T.P.: A survey on virtualization service providers, security issues, tools and future trends. Int. J. Comput. Appl. 69(24), 36–42 (2013)

    Google Scholar 

  5. Loganayagi, B., Sujatha, S.: Enhanced cloud security by combining virtualization and policy monitoring techniques. Procedia Eng. 30, 654–661 (2012)

    Article  Google Scholar 

Download references

Acknowledgement

This research was supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2016-H8501-16-1014) supervised by the IITP (Institute for Information & communications Technology Promotion).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong Hyuk Park .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Singh, S., Sharma, P.K., Park, J.H. (2017). A Security Model for Protecting Virtualization in Cloud Computing. In: Park, J., Pan, Y., Yi, G., Loia, V. (eds) Advances in Computer Science and Ubiquitous Computing. UCAWSN CUTE CSA 2016 2016 2016. Lecture Notes in Electrical Engineering, vol 421. Springer, Singapore. https://doi.org/10.1007/978-981-10-3023-9_60

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3023-9_60

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3022-2

  • Online ISBN: 978-981-10-3023-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics