Security challenges and countermeasures for trusted virtualized computing environments

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Today, virtualization technology is ubiquitously woven into nearly every technical field and conversation, taking place in the world of Information Technology (IT), because it can provide various benefits in terms of cost effectiveness, availability, hardware utilization, resource protection, remote access, and other capability enhancements. As a result, the implications of virtual computing environments become profound and drive a shift in the fundamentals of information systems design, operation, and management. However, virtualization also introduces new challenges and concerns related to implementing secure virtualized computing environments. Therefore, in this paper we first discuss common exploits of security properties in virtualized computing environments and analyze their security vulnerabilities from the perspective of attackers. Consequently, we identify and discuss the main areas of virtualized information system design and operation in which security concerns must be addressed. Finally, we present our recommendations and future trends for trusted virtualized computing environments.

Original languageEnglish (US)
Title of host publicationWorld Congress on Internet Security, WorldCIS-2012
Pages117-122
Number of pages6
StatePublished - 2012
EventWorld Congress on Internet Security, WorldCIS-2012 - Guelph, ON, Canada
Duration: Jun 10 2012Jun 12 2012

Other

OtherWorld Congress on Internet Security, WorldCIS-2012
CountryCanada
CityGuelph, ON
Period6/10/126/12/12

Fingerprint

Information systems
Systems analysis
Cost effectiveness
Information technology
Availability
Hardware
Trusted computing
Virtualization

Keywords

  • security vulnerabilities
  • trusted computing
  • virtual machines
  • virtualization

ASJC Scopus subject areas

  • Computer Networks and Communications

Cite this

Brooks, T., Caicedo Bastidas, C. E., & Park, J. S. (2012). Security challenges and countermeasures for trusted virtualized computing environments. In World Congress on Internet Security, WorldCIS-2012 (pp. 117-122). [6280210]

Security challenges and countermeasures for trusted virtualized computing environments. / Brooks, Tyson; Caicedo Bastidas, Carlos Enrique; Park, Joon S.

World Congress on Internet Security, WorldCIS-2012. 2012. p. 117-122 6280210.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Brooks, T, Caicedo Bastidas, CE & Park, JS 2012, Security challenges and countermeasures for trusted virtualized computing environments. in World Congress on Internet Security, WorldCIS-2012., 6280210, pp. 117-122, World Congress on Internet Security, WorldCIS-2012, Guelph, ON, Canada, 6/10/12.
Brooks T, Caicedo Bastidas CE, Park JS. Security challenges and countermeasures for trusted virtualized computing environments. In World Congress on Internet Security, WorldCIS-2012. 2012. p. 117-122. 6280210
@inproceedings{2c230e73eeb34518b031086a296ee04d,
title = "Security challenges and countermeasures for trusted virtualized computing environments",
abstract = "Today, virtualization technology is ubiquitously woven into nearly every technical field and conversation, taking place in the world of Information Technology (IT), because it can provide various benefits in terms of cost effectiveness, availability, hardware utilization, resource protection, remote access, and other capability enhancements. As a result, the implications of virtual computing environments become profound and drive a shift in the fundamentals of information systems design, operation, and management. However, virtualization also introduces new challenges and concerns related to implementing secure virtualized computing environments. Therefore, in this paper we first discuss common exploits of security properties in virtualized computing environments and analyze their security vulnerabilities from the perspective of attackers. Consequently, we identify and discuss the main areas of virtualized information system design and operation in which security concerns must be addressed. Finally, we present our recommendations and future trends for trusted virtualized computing environments.",
keywords = "security vulnerabilities, trusted computing, virtual machines, virtualization",
author = "Tyson Brooks and {Caicedo Bastidas}, {Carlos Enrique} and Park, {Joon S}",
year = "2012",
language = "English (US)",
isbn = "9781908320049",
pages = "117--122",
booktitle = "World Congress on Internet Security, WorldCIS-2012",

}

TY - GEN

T1 - Security challenges and countermeasures for trusted virtualized computing environments

AU - Brooks, Tyson

AU - Caicedo Bastidas, Carlos Enrique

AU - Park, Joon S

PY - 2012

Y1 - 2012

N2 - Today, virtualization technology is ubiquitously woven into nearly every technical field and conversation, taking place in the world of Information Technology (IT), because it can provide various benefits in terms of cost effectiveness, availability, hardware utilization, resource protection, remote access, and other capability enhancements. As a result, the implications of virtual computing environments become profound and drive a shift in the fundamentals of information systems design, operation, and management. However, virtualization also introduces new challenges and concerns related to implementing secure virtualized computing environments. Therefore, in this paper we first discuss common exploits of security properties in virtualized computing environments and analyze their security vulnerabilities from the perspective of attackers. Consequently, we identify and discuss the main areas of virtualized information system design and operation in which security concerns must be addressed. Finally, we present our recommendations and future trends for trusted virtualized computing environments.

AB - Today, virtualization technology is ubiquitously woven into nearly every technical field and conversation, taking place in the world of Information Technology (IT), because it can provide various benefits in terms of cost effectiveness, availability, hardware utilization, resource protection, remote access, and other capability enhancements. As a result, the implications of virtual computing environments become profound and drive a shift in the fundamentals of information systems design, operation, and management. However, virtualization also introduces new challenges and concerns related to implementing secure virtualized computing environments. Therefore, in this paper we first discuss common exploits of security properties in virtualized computing environments and analyze their security vulnerabilities from the perspective of attackers. Consequently, we identify and discuss the main areas of virtualized information system design and operation in which security concerns must be addressed. Finally, we present our recommendations and future trends for trusted virtualized computing environments.

KW - security vulnerabilities

KW - trusted computing

KW - virtual machines

KW - virtualization

UR - http://www.scopus.com/inward/record.url?scp=84867183180&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84867183180&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:84867183180

SN - 9781908320049

SP - 117

EP - 122

BT - World Congress on Internet Security, WorldCIS-2012

ER -