Cloud Security and Virtualization

Authors

  • Priyanshu Su Panda School of Computer Engineering, KIIT Deemed to Be University, Bhubaneswar-751024, Odisha, India‎.
  • Om Priyadarshan School of Computer Engineering, KIIT Deemed to Be University, Bhubaneswar-751024, Odisha, India‎.
  • Lokesh Dash School of Computer Engineering, KIIT Deemed to Be University, Bhubaneswar-751024, Odisha, India‎.

Keywords:

Security, Cybersecurity, Virtual

Abstract

As organizations increasingly adopt cloud computing and virtualization technologies to enhance flexibility, scalability, and cost-efficiency, concerns about security have become paramount. This abstract explores the intersection of cloud security and virtualization, addressing the challenges and strategies for ensuring robust data protection in this dynamic environment. The paper delves into the unique security risks posed by cloud computing and virtualization, including data breaches, unauthorized access, and compliance issues. It discusses the importance of implementing comprehensive security measures, such as encryption, access controls, and intrusion detection systems, to safeguard sensitive data across cloud and virtualized environments. Furthermore, the abstract examines emerging trends and technologies, such as containerization and software-defined networking, that offer enhanced security capabilities for mitigating risks in the cloud. By understanding and addressing these challenges, organizations can leverage the benefits of cloud computing and virtualization while maintaining the highest standards of data security and privacy.     

References

‎[1] ‎Etro, F. (2009). The economic impact of cloud computing on business creation, employment and output ‎in Europe. Review of business and economics, 54(2), 179–208.‎

‎[2] ‎Baiardi, F., Maggiari, D., Sgandurra, D., & Tamberi, F. (2009). Transparent process monitoring in a ‎virtual environment. Electronic notes in theoretical computer science, 236, 85–100. ‎ https://doi.org/10.1016/j.entcs.2009.03.016‎

‎[3] ‎Virtualization, A. (2005). Secure virtual machine architecture reference manual. AMD publication.‎https://0x04.net/~mwk/doc/amd/33047.pdf

‎[4] ‎Bijon, K., Krishnan, R., & Sandhu, R. (2015). Mitigating multi-tenancy risks in IAAS cloud through ‎constraints-driven virtual resource scheduling. Proceedings of the 20th ACM symposium on access control ‎models and technologies (pp. 63–74). Association for Computing Machinery.‎ https://doi.org/10.1145/2752952.2752964‎

‎[5] ‎Bele, R., & Desai, C. (2012). Review on virtualization: In the light of storage and server virtualization ‎technology. Journal of information and operations management, 3(1), 245-260.‎

‎[6] ‎Brasser, F., Capkun, S., Dmitrienko, A., Frassetto, T., Kostiainen, K., & Sadeghi, A. R. (2017). DR. SGX: ‎hardening SGX enclaves against cache attacks with data location randomization.‎https://doi.org/10.48550/arXiv.1709.09917‎

‎[7] ‎Cazalas, J., McDonald, J. T., Andel, T. R., & Stakhanova, N. (2014). Probing the limits of virtualized ‎software protection. Proceedings of the 4th program protection and reverse engineering workshop (pp. 1–11). ‎Association for Computing Machinery. https://doi.org/10.1145/2689702.2689707‎

‎[8] ‎International organization for standardization (ISO). (2015). ISO/IEC 27017:2015 - Information technology ‎‎-- security techniques -- code of practice for information security controls based on ISO/IEC 27002 for cloud ‎services. https://www.iso.org/standard/43757.html

‎[9] ‎Luo, S., Lin, Z., Chen, X., Yang, Z., & Chen, J. (2011). Virtualization security for cloud computing ‎service. 2011 international conference on cloud and service computing (pp. 174–179). IEEE. ‎https://doi.org/10.1109/CSC.2011.6138516‎

‎[10] ‎Mohapatra, H., & Rath, A. K. (2019). Fault tolerance in WSN through PE-LEACH protocol. IET wireless ‎sensor systems, 9(6), 358–365.‎

‎[11] ‎Bele, S., & Desai, D. (2012). Exploring the concept of virtualization beyond server virtualization. Journal ‎of cloud computing: advances, systems and applications, 1(1), 1–17.‎

‎[12] ‎Hu, Y., Li, T., Yang, P., & Gopalan, K. (2013). An application-level approach for privacy-preserving ‎virtual machine checkpointing. 2013 IEEE sixth international conference on cloud computing (pp. 59–66). ‎IEEE. https://doi.org/10.1109/CLOUD.2013.28‎

‎[13] ‎Mohapatra, H., & Rath, A. K. (2019). Detection and avoidance of water loss through municipality taps ‎in India by using smart taps and ICT. IET wireless sensor systems, 9(6), 447–457.‎

‎[14] ‎Jansen, W., Grance, T., & others. (2011). Guidelines on security and privacy in public cloud computing. ‎https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-144.pdf‎

‎[15] Bhalotia, N., Kumar, M., Alameen, A., Mohapatra, H., & Kolhar, M. (2023). A helping hand to the ‎elderly: securing their freedom through the HAIE framework. Applied sciences, 13(11), 6797. ‎https://doi.org/10.3390/app13116797‎

‎[16] ‎Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud security and privacy: an enterprise perspective on ‎risks and compliance. O’Reilly Media, Inc. https://books.google.com/books?id=BHazecOuDLYC&dq

‎[17] ‎Mohapatra, H. (2021). Socio-technical challenges in the implementation of smart city. 2021 international ‎conference on innovation and intelligence for informatics, computing, and technologies (3ICT) (pp. 57–62). IEEE ‎https://doi.org/10.1109/3ICT53449.2021.9581905‎

‎[18] ‎Mohapatra, H., & Mishra, S. R. (2024). Unlocking insights: exploring data analytics and AI tool ‎performance across industries. In Data analytics and machine learning: navigating the big data landscape (pp. ‎‎265–288). Springer. https://link.springer.com/chapter/10.1007/978-981-97-0448-4_13‎

‎[19] ‎Mohapatra, H., & Rath, A. K. (2019). Fault tolerance through energy balanced cluster formation (EBCF) ‎in WSN. Smart innovations in communication and computational sciences: proceedings of icsiccs-2018 (pp. 313–‎‎321). Springer.‎

‎[20] ‎National Institute of Standards and Technology (NIST). (2011). NIST special publication 800-144: guidelines ‎on security and privacy in public cloud computing. ‎https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf‎

‎[21] ‎Mohapatra, H., & Rath, A. K. (2020). Survey on fault tolerance-based clustering evolution in WSN. IET ‎networks, 9(4), 145–155.‎

‎[22] ‎Pearson, S. (2013). Privacy, security, and trust issues arising from cloud computing. In Cloud computing ‎‎(pp. 357–388). Springer.‎

‎[23] ‎Mohapatra, H., & Rath, A. K. (2022). IoE based framework for smart agriculture: networking among all ‎agricultural attributes. Journal of ambient intelligence and humanized computing, 13(1), 407–424. ‎DOI:10.1007/s12652-021-02908-4‎

‎[24] ‎Hoopes, J. (2009). Virtualization for security: including sandboxing, disaster recovery, high availability, forensic ‎analysis, and honeypotting. Syngress.‎

‎[25] ‎Rath, A. K., & Mohapatra, H. (2020). Fundamentals of software engineering designed to provide an insight into ‎the software engineering concepts. Bpb Publications.‎

‎[26] ‎Niyaz, Q., Sun, W., Zhang, Y., & Choo, K. K. R. (2018). A survey of virtualization-based security ‎solutions for cloud computing. Journal of network and computer applications, 96, 1–16.‎

Published

2024-05-10

How to Cite