DocumentCode :
2772650
Title :
Cloud security tactics: Virtualization and the VMM
Author :
Kalagiakos, Panagiotis ; Bora, Margarita
Author_Institution :
Dept. of Inf. Technol., Hellenic American Univ., Manchester, NH, USA
fYear :
2012
fDate :
17-19 Oct. 2012
Firstpage :
1
Lastpage :
6
Abstract :
Cloud Computing is acclaimed to be the new paradigm that will reform organizations and pave the way to new and better business practices. Its abundant features captivated the interest of many individuals and organizations, either as customers or providers. The market, emboldened by optimistic reports regarding the future of cloud computing, demands further innovative services and features. The migration to cloud computing, however, is deterred by the issue of security. Especially, in virtual environments, security is a major concern, as multi-tenancy may facilitate cyber attacks at a massive scale. The subversion of a system implicates multiple customers, augmenting the potential impact. Thus, researchers have concentrated their efforts in designing architectures and techniques that will endorse security in virtualized environments of the cloud. In this paper, we present the latest proposed techniques which aim to enhance security and revolve directly or indirectly around the most important component of the virtual environment, the Virtual Machine Monitor.
Keywords :
business data processing; cloud computing; security of data; virtual machines; virtualisation; VMM; business practices; cloud computing; cloud security tactics; cyber attacks; innovative services; multitenancy; security issue; virtual machine monitor; virtualization; virtualized environments; Cloud computing; Computer architecture; Hardware; Security; Virtual machine monitors; cloud computing; hypervisor; security; virtual machine monitor;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Application of Information and Communication Technologies (AICT), 2012 6th International Conference on
Conference_Location :
Tbilisi
Print_ISBN :
978-1-4673-1739-9
Type :
conf
DOI :
10.1109/ICAICT.2012.6398491
Filename :
6398491
Link To Document :
بازگشت