Skip to main content
Top
Published in: The Journal of Supercomputing 1/2016

01-01-2016

A novel secure architecture of the virtualized server system

Authors: Sang-Kon Kim, Seung-Young Ma, Jongsub Moon

Published in: The Journal of Supercomputing | Issue 1/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

To make cloud computing environments more secure, this paper focuses on the security of virtualized server systems. A security layer is introduced to the secure architecture of a virtualized server as an abstraction. Because the security layer will play a key role in securing the virtualized server, there is a need for it to be sufficiently robust to tackle the most common security threats associated with cloud computing. First, security threats to cloud computing are analysed based on a publication from an international organization and the security issues surrounding virtualized servers are clarified. Following this, the security elements and their functions for each of the security requirements for virtualized servers are defined. The relationship between the security issues and security elements is then presented to verify the effectiveness of the security layer. It is shown that, using the proposed security elements, the security issues facing virtualized server systems in cloud computing are adequately mitigated. Therefore, our research will be helpful in the development of virtualized servers by making cloud computing more secure.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Youseff L, Butrico M, Da Silva D (2008) Toward a unified ontology of cloud computing. In: The grid computing environments workshop, Austin, Texas, 12–16 Nov Youseff L, Butrico M, Da Silva D (2008) Toward a unified ontology of cloud computing. In: The grid computing environments workshop, Austin, Texas, 12–16 Nov
4.
5.
go back to reference Fraser K, Hand S, Neugebauer R, Pratt I, Warfield A, Williams M (2004) Safe hardware access with the Xen virtual machine monitor. In: Proceedings of 1st Workshop Oper. Syst. Architect. Support demand IT InfraStruct. Boston, pp 1–10 Fraser K, Hand S, Neugebauer R, Pratt I, Warfield A, Williams M (2004) Safe hardware access with the Xen virtual machine monitor. In: Proceedings of 1st Workshop Oper. Syst. Architect. Support demand IT InfraStruct. Boston, pp 1–10
6.
go back to reference Whitaker A, Shaw M, Gribble SD (2002) Denali: lightweight virtual machines for distributed and networked applications. In: Tech. Rep. 02-02-01, Univ. Washington, Seattle Whitaker A, Shaw M, Gribble SD (2002) Denali: lightweight virtual machines for distributed and networked applications. In: Tech. Rep. 02-02-01, Univ. Washington, Seattle
7.
go back to reference Nakajima J, Lin Q, Yang S, Zhu M, Gao S, Xia M, Yu P, Dong Y, Qi Z, Guan H (2011) Optimizing virtual machines using hybrid virtualization. In: Proceedings of ACM 26th SAC. Taichung, pp 573–578 Nakajima J, Lin Q, Yang S, Zhu M, Gao S, Xia M, Yu P, Dong Y, Qi Z, Guan H (2011) Optimizing virtual machines using hybrid virtualization. In: Proceedings of ACM 26th SAC. Taichung, pp 573–578
8.
go back to reference Dong Y, Zhang X, Dai J, Guan H (2014) HYVI: a hybrid virtualization solution balancing performance and manageability. IEEE Trans Parallel Distrib Syst 25(9):2332–2341CrossRef Dong Y, Zhang X, Dai J, Guan H (2014) HYVI: a hybrid virtualization solution balancing performance and manageability. IEEE Trans Parallel Distrib Syst 25(9):2332–2341CrossRef
12.
go back to reference Recommendation ITU-T Y.3502 (2014). Information technology—cloud computing—reference architecture Recommendation ITU-T Y.3502 (2014). Information technology—cloud computing—reference architecture
13.
go back to reference Recommendation ITU-T X.1601 (2014). Security framework for cloud computing Recommendation ITU-T X.1601 (2014). Security framework for cloud computing
14.
go back to reference Lee K (2012) Security threats in cloud computing environments. Int J Security Appl 6(4) Lee K (2012) Security threats in cloud computing environments. Int J Security Appl 6(4)
15.
go back to reference Lee C, Kim S, Yeo Y, Moon J (2013) Proposal of security requirements based on layers and roles for the standardization of cloud computing security technology. J Security Eng 10(4) Lee C, Kim S, Yeo Y, Moon J (2013) Proposal of security requirements based on layers and roles for the standardization of cloud computing security technology. J Security Eng 10(4)
16.
go back to reference Cloud Security Alliance (2013) The notorious nine: cloud computing top threats in 2013 Cloud Security Alliance (2013) The notorious nine: cloud computing top threats in 2013
17.
go back to reference European Network and Information Security Agency (2013) Threat landscape 2013 European Network and Information Security Agency (2013) Threat landscape 2013
Metadata
Title
A novel secure architecture of the virtualized server system
Authors
Sang-Kon Kim
Seung-Young Ma
Jongsub Moon
Publication date
01-01-2016
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 1/2016
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-015-1401-4

Other articles of this Issue 1/2016

The Journal of Supercomputing 1/2016 Go to the issue

Premium Partner