Abstract
A multi-tenant Cloud Computing Infrastructure (CCI) consists of several Virtual Machines (VMs) running on same physical platform by using virtualization techniques. The VMs are monitored and managed by kernel based software i.e. Virtual Machine Monitor (VMM) or hypervisor which is main component of Virtualized Cloud Computing Infrastructure (VCCI). Due to software based vulnerabilities, VMMs are compromised to security attacks that may take place from inside or outside attackers. In order to formulate a secure VCCI, VMM must be protected by implementing strong security tools and techniques such as Encryption and Key Management (EKM), Access Control Mechanisms (ACMs), Intrusion Detection Tools (IDTs), Virtual Trusted Platform Module (vTPM), Virtual Firewalls (VFs) and Trusted Virtual Domains (TVDs). In this research paper we describe the techniques of virtualizing a CCI, types of attacks on VCCI, vulnerabilities of VMMs and we critically describe the significance of security tools and techniques for securing a VCCI.
Original language | English |
---|---|
Title of host publication | Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012 |
Pages | 151-155 |
Number of pages | 5 |
DOIs | |
Publication status | Published - 2012 |
Externally published | Yes |
Event | International Conference on Cloud Computing Technologies, Applications and Management 2012 - Dubai, United Arab Emirates Duration: 8 Dec 2012 → 10 Dec 2012 https://ieeexplore.ieee.org/xpl/conhome/6479729/proceeding (Proceedings) |
Conference
Conference | International Conference on Cloud Computing Technologies, Applications and Management 2012 |
---|---|
Abbreviated title | ICCCTAM 2012 |
Country/Territory | United Arab Emirates |
City | Dubai |
Period | 8/12/12 → 10/12/12 |
Internet address |
Keywords
- Attacks and Vulnerabilities
- Security Tools and Techniques
- Virtual Machine Monitor
- Virtualization