Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A SURVEY OF THE HOST HYPERVISOR SECURITY ISSUES PRESENTED IN PUBLIC IAAS ENVIRONMENTS AND THEIR SOLUTIONS

View through CrossRef
The use of virtualization can be attributed to the success of cloud computing. However, usage of a hypervisor in a shared environment among mistrusting users presents significant challenges. This paper surveys the works on host hypervisor security issues presented in cloud computing, performing a short review of current literature on the subject. Addressing several key topics, namely threats and known attacks against the hypervisor or a virtual machine (vm) that exist in a shared environment. This paper also contains a thorough review and comparison of the current solutions and proposed mitigations for the known attacks and identifies any potential gaps. Aiming to uncover if a hypervisor can provide the level of confidentiality, integrity and availability expected by cloud consumers. Research is critically analyzed and consideration for each solutions suitability of implementation in an Infrastructure as a Service (IaaS) environment is applied, including the impact on performance, if any.
Title: A SURVEY OF THE HOST HYPERVISOR SECURITY ISSUES PRESENTED IN PUBLIC IAAS ENVIRONMENTS AND THEIR SOLUTIONS
Description:
The use of virtualization can be attributed to the success of cloud computing.
However, usage of a hypervisor in a shared environment among mistrusting users presents significant challenges.
This paper surveys the works on host hypervisor security issues presented in cloud computing, performing a short review of current literature on the subject.
Addressing several key topics, namely threats and known attacks against the hypervisor or a virtual machine (vm) that exist in a shared environment.
This paper also contains a thorough review and comparison of the current solutions and proposed mitigations for the known attacks and identifies any potential gaps.
Aiming to uncover if a hypervisor can provide the level of confidentiality, integrity and availability expected by cloud consumers.
Research is critically analyzed and consideration for each solutions suitability of implementation in an Infrastructure as a Service (IaaS) environment is applied, including the impact on performance, if any.

Related Results

Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
Container Security in Cloud Environments
Container Security in Cloud Environments
A bstract: The widespread adoption of containers in modern software applications has introduced new challenges to se...
Emergent RNA-RNA interactions can promote stability in a nascent phototrophic endosymbiosis
Emergent RNA-RNA interactions can promote stability in a nascent phototrophic endosymbiosis
ABSTRACTEukaryote-eukaryote endosymbiosis was responsible for the spread of chloroplast (plastid) organelles. Stability is required for the metabolic and genetic integration that d...
Quantifying the relationship between within-host dynamics and transmission for viral diseases of livestock
Quantifying the relationship between within-host dynamics and transmission for viral diseases of livestock
AbstractUnderstanding the population dynamics of an infectious disease requires linking within-host dynamics and between-host transmission in a quantitative manner, but this is sel...
Radium: Secure Policy Engine in Hypervisor
Radium: Secure Policy Engine in Hypervisor
The basis of today’s security systems is the trust and confidence that the system will behave as expected and are in a known good trusted state. The trust is built from hardware an...
National security and public administration
National security and public administration
The article deals with the problem of national security in the contemporary world which is greatly influenced by the process of globalization and digitalization. The paper highligh...
Cash‐based approaches in humanitarian emergencies: a systematic review
Cash‐based approaches in humanitarian emergencies: a systematic review
This Campbell systematic review examines the effectiveness, efficiency and implementation of cash transfers in humanitarian settings. The review summarises evidence from five studi...
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Abstract As part of PETRONAS approach to sustainability, the organization has made more concerted effort to purposefully adopt Circular Economy (CE) across PETRONAS ...

Back to Top