Journal of Information Security

Volume 8, Issue 1 (January 2017)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment

HTML  XML Download Download as PDF (Size: 503KB)  PP. 1-7  
DOI: 10.4236/jis.2017.81001    3,327 Downloads   7,311 Views  Citations

ABSTRACT

The data and applications in cloud computing reside in cyberspace, that allowing to users access data through any connection device, when you need to transfer information over the cloud, you will lose control of it. There are multi types of security challenge must be understood and countermeasures. One of the major security challenges is resources of the cloud computing infrastructures are provided as services over the Internet, and entire data in the cloud computing are reside over network resources, that enables the data to be access through VMs. In this work, we describe security techniques for securing a VCCI, VMMs such as Encryption and Key Management (EKM), Access Control Mechanisms (ACMs), Virtual Trusted Platform Module (vTPM), Virtual Firewall (VF), and Trusted Virtual Domains (TVDs). In this paper we focus on security of virtual resources in Virtualized Cloud Computing Infrastructure (VCCI), Virtual Machine Monitor (VMM) by describing types of attacks on VCCI, and vulnerabilities of VMMs and we describe the techniques for securing a VCCI.

Share and Cite:

Althobaiti, A. (2017) Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment. Journal of Information Security, 8, 1-7. doi: 10.4236/jis.2017.81001.

Cited by

[1] A Novel VM Hardening Policy for Enhancing VM Security under Cross-Virtualization Platform
2021
[2] Dynamic and scalable virtual machine placement algorithm for mitigating side channel attacks in cloud computing
2021
[3] Machine learning-based anomalies detection in cloud virtual machine resource usage
2021 1st International Conference on …, 2021
[4] Real-time detection method for mobile network traffic anomalies considering user behavior security monitoring
… Conference on Computer …, 2021
[5] A Noble Approach Toward Security Implementation in Cloud Virtualization Framework
2020
[6] Exploring Defense Federal Acquisition Regulations Supplement (Dfars) Compliance Strategies in Cloud Computing: A Case Study
2020
[7] Virtual Machine Escape in Cloud Computing Services
2020
[8] Unusual Behavior Analysis of Virtual Machine in Cloud Environment
2020
[9] A Taxonomy of Virtualization Security Issues in Cloud Computing Environments
2019

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.