2011 Third International Conference on Multimedia Information Networking and Security 2011
DOI: 10.1109/mines.2011.54
|View full text |Cite
|
Sign up to set email alerts
|

Virtualization Security Risks and Solutions of Cloud Computing via Divide-Conquer Strategy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 9 publications
0
10
0
Order By: Relevance
“…Numerous researchers have proposed risk assessment methods in the cloud computing environment. Some of these studies focused on specific security problems, such as insider attacks, virtualization threats [], data transmission with cloud computing service‐level agreement , anti‐virus in the cloud service , denial of service attacks in cloud , and identity management . In addition, frameworks, which are used to assess security risks in cloud computing environments as a whole process, have also been proposed.…”
Section: Security Risk Assessment In Cloud Computingmentioning
confidence: 99%
“…Numerous researchers have proposed risk assessment methods in the cloud computing environment. Some of these studies focused on specific security problems, such as insider attacks, virtualization threats [], data transmission with cloud computing service‐level agreement , anti‐virus in the cloud service , denial of service attacks in cloud , and identity management . In addition, frameworks, which are used to assess security risks in cloud computing environments as a whole process, have also been proposed.…”
Section: Security Risk Assessment In Cloud Computingmentioning
confidence: 99%
“…In fact, literature abounds of works on the sanitization of carriers or the normalization of network traffic (see, e.g., references [5] and [3] and the references therein) but not any prior work investigates how a covert channel or a steganographic threat could be detect or prevented by means of virtualization. A variety of works address the security of virtualized architectures, but they mainly focus on the following classes of hazards [14]: access control of resources, DoS and DDoS attacks, virtualization to build the network infrastructure, and security management of virtualized assets. Even if the security risks caused by mobility, migration and hopping of virtual machines are well understood [15], steganographic threats are solely discussed without considering the overall architecture or the peculiarities of large-scale virtualized network scenario.…”
Section: Related Workmentioning
confidence: 99%
“…Virtualization is a fundamental technology used by cloud vendors to achieve multi-tenant architecture, where it divides the computing resources of cloud server into multiple execution environments [31].…”
Section: Cloud Infrastructurementioning
confidence: 99%