Security Management in Server Virtualization

Authors

  • Felipe Arévalo Cordovilla Universidad Estatal de Milagro, Ecuador Author https://orcid.org/0000-0003-0666-8004
    • Braulio Arévalo Cordovilla Universidad Estatal de Milagro, Ecuador Author https://orcid.org/0000-0001-7270-171X
      • Luis Castillo Salvatierra Universidad Estatal de Milagro, Ecuador Author
        • Alejandro Cortez Lara Universidad Estatal de Milagro, Ecuador Author

          DOI:

          https://doi.org/10.46480/esj.5.4.178

          Keywords:

          Cloud computing, IaaS, Information Security, Security Threats, Virtualization

          Abstract

          This project focuses on the field of Security in Virtual Servers in the Cloud environments. Specifically, the security at the IaaS is studied. The specific case related to minimization of risks when allocating new virtual machines into physical machines is studied. The case of how a vulnerable virtual machine that is allocated in a physical server can compromise the neighboring virtual machines and even the physical server is explained. In this study a new method for quantifying the security risk of virtual machines is proposed. This parameter helps in the decision-making task for choosing the physical server to install the new virtual server in order to maximize the security. A security good practice guide focusing on Virtual Server Security is provided in this document.

           

          Downloads

          Download data is not yet available.

          References

          Bhagat, S. P., Patil, V. S., & Meshram, B. B. (2020). Security Issues Due to Vulnerabilities in the Virtual Machine of Cloud Computing. Advances in Intelligent Systems and Computing, 1034, 625–634. https://doi.org/10.1007/978-981-15-1084-7_60

          Bugiel S, Nurnberge S, Poppelmann T, Sadeghi A, & Schneider T. (2011). AmazonIA: when elasticity snaps back. 726.

          Common Vulnerability Scoring System SIG. (2021). https://www.first.org/cvss/

          Deshpande, U., Chan, D., Chan, S., Gopalan, K., & Bila, N. (2018). Scatter-Gather Live Migration of Virtual Machines. IEEE Transactions on Cloud Computing, 6(1), 196–208. https://doi.org/10.1109/TCC.2015.2481424

          Fu, X., Zhao, Q., Wang, J., Zhang, L., & Qiao, L. (2018). Energy-Aware VM Initial Placement Strategy Based on BPSO in Cloud Computing. Scientific Programming, 2018. https://doi.org/10.1155/2018/9471356

          Hernández-Sampieri Roberto, & Mendoza Torres Christian. (2018). Metodología de la investigación. Las rutas cuantitativa, cualitativa y mixta.

          Lisdorf, A. (2021). Cloud Computing Basics. In Cloud Computing Basics. Apress. https://doi.org/10.1007/978-1-4842-6921-3

          National Vulnerability Database. (2021). https://nvd.nist.gov/

          Rakotondravony, N., Taubmann, B., Mandarawi, W., Weishäupl, E., Xu, P., Kolosnjaji, B., Protsenko, M., de Meer, H., & Reiser, H. P. (2017). Classifying malware attacks in IaaS cloud environments. Journal of Cloud Computing, 6(1). https://doi.org/10.1186/s13677-017-0098-8

          Published

          2021-12-31

          Issue

          Section

          Research Paper

          How to Cite

          [1]
          F. Arévalo Cordovilla, B. Arévalo Cordovilla, L. Castillo Salvatierra, and A. Cortez Lara, “Security Management in Server Virtualization”, Ecuad. Sci. J, vol. 5, no. 4, pp. 150–162, Dec. 2021, doi: 10.46480/esj.5.4.178.

          Similar Articles

          You may also start an advanced similarity search for this article.