Javascript must be enabled to continue!
A SURVEY OF THE HOST HYPERVISOR SECURITY ISSUES PRESENTED IN PUBLIC IAAS ENVIRONMENTS AND THEIR SOLUTIONS
View through CrossRef
The use of virtualization can be attributed
to the success of cloud computing. However, usage of a
hypervisor in a shared environment among mistrusting
users presents significant challenges. This paper surveys
the works on host hypervisor security issues presented in
cloud computing, performing a short review of current
literature on the subject. Addressing several key topics,
namely threats and known attacks against the hypervisor
or a virtual machine (vm) that exist in a shared
environment.
This paper also contains a thorough review and
comparison of the current solutions and proposed
mitigations for the known attacks and identifies any
potential gaps. Aiming to uncover if a hypervisor can
provide the level of confidentiality, integrity and
availability expected by cloud consumers. Research is
critically analyzed and consideration for each solutions
suitability of implementation in an Infrastructure as a
Service (IaaS) environment is applied, including the
impact on performance, if any.
Title: A SURVEY OF THE HOST HYPERVISOR SECURITY ISSUES PRESENTED IN PUBLIC IAAS ENVIRONMENTS AND THEIR SOLUTIONS
Description:
The use of virtualization can be attributed
to the success of cloud computing.
However, usage of a
hypervisor in a shared environment among mistrusting
users presents significant challenges.
This paper surveys
the works on host hypervisor security issues presented in
cloud computing, performing a short review of current
literature on the subject.
Addressing several key topics,
namely threats and known attacks against the hypervisor
or a virtual machine (vm) that exist in a shared
environment.
This paper also contains a thorough review and
comparison of the current solutions and proposed
mitigations for the known attacks and identifies any
potential gaps.
Aiming to uncover if a hypervisor can
provide the level of confidentiality, integrity and
availability expected by cloud consumers.
Research is
critically analyzed and consideration for each solutions
suitability of implementation in an Infrastructure as a
Service (IaaS) environment is applied, including the
impact on performance, if any.
Related Results
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
Container Security in Cloud Environments
Container Security in Cloud Environments
A
bstract:
The widespread adoption of containers in modern software applications has introduced new challenges to se...
Emergent RNA-RNA interactions can promote stability in a nascent phototrophic endosymbiosis
Emergent RNA-RNA interactions can promote stability in a nascent phototrophic endosymbiosis
ABSTRACTEukaryote-eukaryote endosymbiosis was responsible for the spread of chloroplast (plastid) organelles. Stability is required for the metabolic and genetic integration that d...
Quantifying the relationship between within-host dynamics and transmission for viral diseases of livestock
Quantifying the relationship between within-host dynamics and transmission for viral diseases of livestock
AbstractUnderstanding the population dynamics of an infectious disease requires linking within-host dynamics and between-host transmission in a quantitative manner, but this is sel...
Radium: Secure Policy Engine in Hypervisor
Radium: Secure Policy Engine in Hypervisor
The basis of today’s security systems is the trust and confidence that the system will behave as expected and are in a known good trusted state. The trust is built from hardware an...
National security and public administration
National security and public administration
The article deals with the problem of national security in the contemporary world which is greatly influenced by the process of globalization and digitalization. The paper highligh...
Cash‐based approaches in humanitarian emergencies: a systematic review
Cash‐based approaches in humanitarian emergencies: a systematic review
This Campbell systematic review examines the effectiveness, efficiency and implementation of cash transfers in humanitarian settings. The review summarises evidence from five studi...
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Abstract
As part of PETRONAS approach to sustainability, the organization has made more concerted effort to purposefully adopt Circular Economy (CE) across PETRONAS ...

