CFP last date
20 January 2025
Reseach Article

A Deep Study on Security Vulnerabilities in Virtualization at Cloud Computing

by Nayeem Khan, Tariq Ahmad War
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 173 - Number 1
Year of Publication: 2017
Authors: Nayeem Khan, Tariq Ahmad War
10.5120/ijca2017915204

Nayeem Khan, Tariq Ahmad War . A Deep Study on Security Vulnerabilities in Virtualization at Cloud Computing. International Journal of Computer Applications. 173, 1 ( Sep 2017), 15-19. DOI=10.5120/ijca2017915204

@article{ 10.5120/ijca2017915204,
author = { Nayeem Khan, Tariq Ahmad War },
title = { A Deep Study on Security Vulnerabilities in Virtualization at Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2017 },
volume = { 173 },
number = { 1 },
month = { Sep },
year = { 2017 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume173/number1/28299-2017915204/ },
doi = { 10.5120/ijca2017915204 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:20:05.674466+05:30
%A Nayeem Khan
%A Tariq Ahmad War
%T A Deep Study on Security Vulnerabilities in Virtualization at Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 173
%N 1
%P 15-19
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Virtualization is the process of creating a virtual representation of architecture. It has advantages on five components; sharing, isolation, aggregation, dynamics, and ease of management. However, issues that rise due to the nature of virtualization, especially security issues has skyrocketed. To counter this, a number of solutions has been presented in multiple literature. In this paper, a new solution to improve the security of the system is proposed. In addition, the flaws of the current implemented system are discussed, and the advantages of the proposed system over the current implemented system are listed out.

References
  1. Garbacki, P., & Naik, V. K. (2007, May). Efficient resource virtualization and sharing strategies for heterogeneous grid environments. In Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International Symposium on (pp. 40-49). IEEE.
  2. Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305, 357-383.
  3. Vaquero, L. M., Rodero-Merino, L., Caceres, J., & Lindner, M. (2008). A break in the clouds: towards a cloud definition. ACM SIGCOMM Computer Communication Review, 39(1), 50-55.
  4. Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Näslund, M., & Pourzandi, M. (2012). A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 1(1), 11.
  5. Chiang, R. C., Rajasekaran, S., Zhang, N., & Huang, H. H. (2015). Swiper: Exploiting virtual machine vulnerability in third-party clouds with competition for i/o resources. IEEE Transactions on Parallel and Distributed Systems, 26(6), 1732-1742.
  6. Jain, R., & Paul, S. (2013). Network virtualization and software defined networking for cloud computing: a survey. IEEE Communications Magazine, 51(11), 24-31.
  7. Ahmad, R. W., Gani, A., Hamid, S. H. A., Shiraz, M., Yousafzai, A., & Xia, F. (2015). A survey on virtual machine migration and server consolidation frameworks for cloud data centers. Journal of Network and Computer Applications, 52, 11-25.
  8. Jain, R., & Paul, S. (2013). Network virtualization and software defined networking for cloud computing: a survey. IEEE Communications Magazine, 51(11), 24-31.
  9. Watson, M. R., Marnerides, A. K., Mauthe, A., & Hutchison, D. (2016). Malware detection in cloud computing infrastructures. IEEE Transactions on Dependable and Secure Computing, 13(2), 192-205.
  10. “Venom vulnerability could expose virtual machine on unpatched host systems”, (2015, May 13). Retrieved from www.symantec.com on 2016
  11. Ho, M. H., Carminati, B., & Kuo, C. (2014). Network and System Security: 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014.
  12. Khan, N., Abdullah, J., & Khan, A. S. (2015, August). Towards vulnerability prevention model for web browser using interceptor approach. In IT in Asia (CITA), 2015 9th International Conference on (pp. 1-5). IEEE.
  13. Khan, N., Abdullah, J., & Khan, A. S. (2017). Defending Malicious Script Attacks Using Machine Learning Classifiers. Wireless Communications and Mobile Computing, 2017.
Index Terms

Computer Science
Information Sciences

Keywords

Virtualization Cloud Computing Hypervisor Virtual machine IaaS PaaS SaaS.