Security Management in Server Virtualization

  • Felipe Arévalo Cordovilla Universidad Estatal de Milagro, Ecuador https://orcid.org/0000-0003-0666-8004
  • Braulio Arévalo Cordovilla Universidad Estatal de Milagro, Ecuador https://orcid.org/0000-0001-7270-171X
  • Luis Castillo Salvatierra Universidad Estatal de Milagro, Ecuador
  • Alejandro Cortez Lara Universidad Estatal de Milagro, Ecuador
Keywords: Cloud computing, IaaS, Information Security, Security Threats, Virtualization

Abstract

This project focuses on the field of Security in Virtual Servers in the Cloud environments. Specifically, the security at the IaaS is studied. The specific case related to minimization of risks when allocating new virtual machines into physical machines is studied. The case of how a vulnerable virtual machine that is allocated in a physical server can compromise the neighboring virtual machines and even the physical server is explained. In this study a new method for quantifying the security risk of virtual machines is proposed. This parameter helps in the decision-making task for choosing the physical server to install the new virtual server in order to maximize the security. A security good practice guide focusing on Virtual Server Security is provided in this document.

 

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

Bhagat, S. P., Patil, V. S., & Meshram, B. B. (2020). Security Issues Due to Vulnerabilities in the Virtual Machine of Cloud Computing. Advances in Intelligent Systems and Computing, 1034, 625–634. https://doi.org/10.1007/978-981-15-1084-7_60

Bugiel S, Nurnberge S, Poppelmann T, Sadeghi A, & Schneider T. (2011). AmazonIA: when elasticity snaps back. 726.

Common Vulnerability Scoring System SIG. (2021). https://www.first.org/cvss/

Deshpande, U., Chan, D., Chan, S., Gopalan, K., & Bila, N. (2018). Scatter-Gather Live Migration of Virtual Machines. IEEE Transactions on Cloud Computing, 6(1), 196–208. https://doi.org/10.1109/TCC.2015.2481424

Fu, X., Zhao, Q., Wang, J., Zhang, L., & Qiao, L. (2018). Energy-Aware VM Initial Placement Strategy Based on BPSO in Cloud Computing. Scientific Programming, 2018. https://doi.org/10.1155/2018/9471356

Hernández-Sampieri Roberto, & Mendoza Torres Christian. (2018). Metodología de la investigación. Las rutas cuantitativa, cualitativa y mixta.

Lisdorf, A. (2021). Cloud Computing Basics. In Cloud Computing Basics. Apress. https://doi.org/10.1007/978-1-4842-6921-3

National Vulnerability Database. (2021). https://nvd.nist.gov/

Rakotondravony, N., Taubmann, B., Mandarawi, W., Weishäupl, E., Xu, P., Kolosnjaji, B., Protsenko, M., de Meer, H., & Reiser, H. P. (2017). Classifying malware attacks in IaaS cloud environments. Journal of Cloud Computing, 6(1). https://doi.org/10.1186/s13677-017-0098-8
Published
2021-12-31
Stats
Abstract 219
PDF (Español (España)) 154 HTML (Español (España)) 0
How to Cite
Arévalo Cordovilla, F., Arévalo Cordovilla, B., Castillo Salvatierra, L., & Cortez Lara, A. (2021). Security Management in Server Virtualization. Ecuadorian Science Journal, 5(4), 150-162. https://doi.org/10.46480/esj.5.4.178
Section
Research Paper
Share |
Citation