Identifying and analyzing security threats to virtualized cloud computing infrastructures

Sarfraz Nawaz Brohi, Mervat Adib Bamiah, Muhammad Nawaz Brohi, Rukshanda Kamran

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

24 Citations (Scopus)


A multi-tenant Cloud Computing Infrastructure (CCI) consists of several Virtual Machines (VMs) running on same physical platform by using virtualization techniques. The VMs are monitored and managed by kernel based software i.e. Virtual Machine Monitor (VMM) or hypervisor which is main component of Virtualized Cloud Computing Infrastructure (VCCI). Due to software based vulnerabilities, VMMs are compromised to security attacks that may take place from inside or outside attackers. In order to formulate a secure VCCI, VMM must be protected by implementing strong security tools and techniques such as Encryption and Key Management (EKM), Access Control Mechanisms (ACMs), Intrusion Detection Tools (IDTs), Virtual Trusted Platform Module (vTPM), Virtual Firewalls (VFs) and Trusted Virtual Domains (TVDs). In this research paper we describe the techniques of virtualizing a CCI, types of attacks on VCCI, vulnerabilities of VMMs and we critically describe the significance of security tools and techniques for securing a VCCI.

Original languageEnglish
Title of host publicationProceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012
Number of pages5
Publication statusPublished - 2012
Externally publishedYes
EventInternational Conference on Cloud Computing Technologies, Applications and Management 2012 - Dubai, United Arab Emirates
Duration: 8 Dec 201210 Dec 2012 (Proceedings)


ConferenceInternational Conference on Cloud Computing Technologies, Applications and Management 2012
Abbreviated titleICCCTAM 2012
Country/TerritoryUnited Arab Emirates
Internet address


  • Attacks and Vulnerabilities
  • Security Tools and Techniques
  • Virtual Machine Monitor
  • Virtualization

Cite this