ABSTRACT
Virtualization allows a single system to concurrently run multiple isolated virtual machines, operating systems (OSes) or multiple instances of a single OS. It helps organizations to improve operational efficiency, reduce costs, improve the use of ha…
See full abstracts, authors, references, citations & other publication information.
+
…rdware, and to allocate resources on-demand. Nevertheless, like most technologies, it has vulnerabilities and threats. Research about security issues related to virtualization has been conducted for several years. However, there are still open challenges related to security in virtualization. This paper looks into some of the differences, issues, challenges, and risks caused by virtualization and aims to classify the various virtualization approaches, along with their goals, advantages and drawbacks from a security perspective. Such classification is expected to help in the identification of virtualization technologies that might be applied in a virtualized infrastructure.
This work is intended to be an introduction to the security considerations, concerns, and implications arising from use of virtualized systems.
Full Text/Reference Website: https://www.cscjournals.org/library/manuscriptinfo.php?mc=IJCSS-1582

AUTHORS
Mr. João Pedro Orvalho – Lab UbiNET – Computer Science Security and Cybercrime, Polytechnic Institute Of Beja, Beja – Portugal
Mr. Rui Filipe Pereira – Lab UbiNET – Computer Science Security and Cybercrime, Polytechnic Institute Of Beja, Beja – Portugal
Mr. Rui Miguel Silva – Lab UbiNET – Computer Science Security and Cybercrime, Polytechnic Institute Of Beja, Beja – Portugal
KEYWORDS
Virtualization, Cybersecurity, Hypervisor, Virtual Machine, Virtual Machine Monitor.
Indexing Keywords: Virtualization and Security Aspects: An Overview, Virtualization and Security Aspects, An Overview of Virtualization and Security Aspects.
Pages: 154-173
Revised: 31-10-2020
Published: 01-12-2020Published in International Journal of Computer Science and Security (IJCSS).
Volume: 14
Issue: 5
Publication Date: 01-12-2020
*Randomly selected references used in the publication “Virtualization and Security Aspects: An Overview”.
- J. S. Reuben, “A Survey on Virtual Machine Security,†2007.
- M. Cobb, “A preview of PCI virtualization specifications,†2011.
- CVE Details, “Vmware Esxi : CVE security vulnerabilities, versions and detailed reports.†[Online]. Available: https://www.cvedetails.com/product/22134/Vmware- Esxi.html?vendor_id=252.
- S. Jagathpal, “Information Security Blog,†18-Feb-2010. [Online]. Available: http://shobhajagathpal.blogspot.com/2010_02_01_archive.html.
- S. Orrin and O’Berry David, “Building Security Beneath the OS – The Security Content Automation,†2011.
- K. Kortchinsky, “Cloudburst: Hacking 3D (and Breaking Out of VMware) for Black Hat USA 2009,†2009.
- A. Pingios, “CVE-2009-3692: VirtualBox VBoxNetAdpCtl Privilege Escalation,†2009. [Online]. Available: https://xorl.wordpress.com/2009/10/13/cve-2009-3692-virtualbox- vboxnetadpctl-privilege-escalation/.
- D. D. Zovi, “Hardware virtualization based rootkits.†Black Hat USA, 2006.
- M. P. Souppaya, K. Scarfone, and P. Hoffman, “Guide to Security for Full Virtualization Technologies,†2011.
- C. Li, A. Raghunathan, and N. K. Jha, “Secure Virtual Machine Execution under an Untrusted Management OS,†in Proceedings – 2010 IEEE 3rd International Conference on Cloud Computing, CLOUD 2010, 2010, pp. 172–179.
CITATIONS
Citations used in the publication “Virtualization and Security Aspects: An Overview”.
Currently there are no citations collected for this publication at scholarlyabstracts.com.
-
CONTACT US
Please feel free to us at scholarlyabstracts@gmail.com if you wish to:
- Get your journal, conference or thesis, registered with us.
- Update this publication content.