Cloud Computing Virtualization – A Threat to Security of the System

1835 Words4 Pages

The main aim of this paper is to study the concept of cloud computing through virtualization, how security is compromised in cloud computing and how we can secure the system from security breach in case of virtualization.
Keywords: cloud computing, Hypervisor, Virtual machine, Virtualization Security.

1. INTRODUCTION

Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.

As we can infer from the definition, cloud infrastructure is as such that anyone can access it anytime from anywhere and the solution which makes this possible is virtualization, virtualization helps multiple user to access the same infrastructure. It is clear that cloud computing is vulnerable to attacks because multiple user access the same infrastructure at the same time. So the question arises here is that how secure is cloud computing?

Security is a core challenge in every system, whether physical or virtualized. As far as we are talking about Virtualization hosts in many ways are more exposed as their standalone counterparts. However, the exposure of the host systems could also lead to weakening of the security of the virtual machines.

2. VIRTUALIZATION

Virtualization is nothing but the simulation of many virtual machines on single computer hardware environment by using virtualization software such as VMware. Virtualization software is installed on computer system an...

... middle of paper ...

...n environment is more vulnerable to attacks and no doubt that it is a threat to the entire system. There are many pros and cons of adopting virtualization and if this technology is used with all due diligence and good planning then virtualization can be very useful.

REFERENCES
1. The NIST Definition of Cloud Computing (Draft),” NIST Special Publication 800-145, p. 2 (Jan. 2011); http://csrc.nist.gov/publications/drafts/800-145/ Draft-SP-800-145_cloud-definition.pdf
2. Diane Barrett, Gregory Kipper. Virtualization and Forensics: A digital forensic investigator’s guide to virtual environment. Elsevier Inc., 2010.
3. EMC Corporation. Using EMC CLARiiON with Microsoft Hyper-V ServerApplied Technology, 2010.
4. Wei Liu –NetApp, Brian Johnson, Kent R. Swalin. Evaluating Microsoft Hyper-V Live Migration Performance Using IBM System x3650 M3 and IBM N series N5600, 2011.

More about Cloud Computing Virtualization – A Threat to Security of the System

Open Document