Ranabhat Saugatdeep,
Moscow Institute of Physics and Technology (MIPT), Moscow, Russia, ranabkhat.s@phystech.edu
Alexey N. Nazarov,
Federal Research Center Computer Science and Control of Russian Academy of Sciences, Moscow, Russia,
a.nazarov06@bk.ru
Tuleun Terhemen Daniel,
Moscow Institute of Physics and Technology (MIPT), Moscow, Russia, tuleun.t@phystech.edu
DOI: 10.36724/2664-066X-2022-8-6-2-9
SYNCHROINFO JOURNAL. Volume 8, Number 6 (2022). P. 2-9.
Abstract
Lately, the most efficient solution for an organization and individual of internet based distributed computing platforms is cloud computing. Processing, storage, and data management are just a few of the useful services that end users can get from cloud computing. However, it raises a lot of issues with privacy and security which needs to be resolved. Major component of cloud computing is virtualization technology, which helps to develop complex cloud services based on the externalization and composition of these resources. The primary concern with cloud computing security is virtualization security. The collective measures and methods that ensure the safety of a virtualization environment are referred to as virtualization security. It tackles the security risks that virtualized components encounter, as well as techniques for mitigating or preventing them. In recent days, attacks are mainly aimed either to the virtualization architecture or the infrastructure. We prefer to examine the security holes associated with virtualization in this paper and how concentrating on virtualization security might ultimately result in safeguarding cloud computing platform. Through this paper we tend to highlight the recent
progress and an overview of the existing works performed on various dimensions of the cloud security. We conclude our paper by making several recommendations with respect to the attack vector for supporting
cloud protection with a mathematical LP model.
Keywords: Secure Cloud Computing, Virtualization Technology, Virtualization Security, Virtual Machine (VM), Data Privacy and Integrity
References
[1] R. La‘Quata Sumter, “Cloud Computing: Security Risk Classification”. ACMSE Oxford. USA, pp. 15-17, Apr 2010. https://doi.org/10.1145/1900008.1900152
[2] Kresimir Popovic et.al. “Cloud Computing Security Issues and Challenges” Proc. 33rd Int’l Convention on Information and Comm. Technology. Electronics and Microelectronics (MIPRO 10). IEEE Press, pp. 344-349, Jun 2010.
[3] H.M. Anitha, P. Jayarekha, “Security Challenges of Virtualization in Cloud Environment”. International Journal of Scientific Research in Computer Science and Engineering. Vol. 6, Issue. 1, pp.37-43, Feb 2018. https://doi.org/10.26438/ijsrcse/v6i1.3743
[4] T. Swathi, K. Srikanth, S. Raghunath Reddy, “Virtualization in Cloud Computing”. International Journal of Computer Science and Mobile Computing, IJCSMC, Vol. 3, Issue. 5, pp. 540-546, May 2014.
[5] L. Malhotra, D. Agarwal and A. Jaiswal, “Virtualization in Cloud Computing”. Journal of Information Technology and Software Engineering, Dec 2014, 4:2. DOI: 10.4172/2165-7866.1000136
[6] Farzad Sabahi, “Secure Virtualization for Cloud Environment Using Hypervisor-based Technology”. International Journal of Machine Learning and Computing. Vol. 2. No. 1, Feb 2012. https://doi.org/10.7763/ijmlc.2012.v2.87
[7] Mladen A. Vouch, “Cloud Computing Issues. Research and Implementations”. Journal of Computing and Information Technology, pp. 235-246, Jun 2008. https://doi.org/10.1109/ ITI.2008.4588381
[8] Z. Gilani, A. Salam, and S. Ul Haq, “Deploying and managing a cloud infrastructure: real world skills for the CompTIA cloud+ certification and beyond,” Wiley, Jan. 2015.
[9] D. Georgiou, and C. Lambrinoudakis, “Compatibility of a security policy for a cloud-based healthcare system with the EU general data protection regulation (GDPR),” Information, 11(12), p. 586, Dec 2020. Available at: https://doi.org/10.3390/info11120586
[10] A.N. Nazarov et al, Alireza Nik Aein Koupaei, Anshita Dhoot, Asyraf Azlan & Seyed Milad Ranaei Siadat, “Mathematical modelling of infrastructure as a Service,” Systems of Signals Generating and Processing in the Field of on Board Communications, Mar 2020. Available at: https://doi.org/10.1109/ieeeconf48371.2020.9078629
[11] A.N. Nazarov, & M.M. Klimanov, “Estimating the informational security level of a typical corporate network”. Automation and Remote Control, no, 71(8), pp. 1550-1561, Aug 2010. https://doi.org/10.1134/s0005117910080059
[12] А. Nazarov, M. Klimanov, “Characteristic analysis of logic and probabilistic model of information security”. Sofia, Bulgaria, Proceedings of International Workshop on Distributed Computer and Communication Computer and Communication Networks, pp. 154-164. Published by Research and Development Company “Information and Networking Technologies”. Oct 2009.