Security challenges and countermeasures for trusted virtualized computing environments

Tyson Brooks, Carlos Caicedo, Joon Park

Research output: Chapter in Book/Entry/PoemConference contribution

4 Scopus citations

Abstract

Today, virtualization technology is ubiquitously woven into nearly every technical field and conversation, taking place in the world of Information Technology (IT), because it can provide various benefits in terms of cost effectiveness, availability, hardware utilization, resource protection, remote access, and other capability enhancements. As a result, the implications of virtual computing environments become profound and drive a shift in the fundamentals of information systems design, operation, and management. However, virtualization also introduces new challenges and concerns related to implementing secure virtualized computing environments. Therefore, in this paper we first discuss common exploits of security properties in virtualized computing environments and analyze their security vulnerabilities from the perspective of attackers. Consequently, we identify and discuss the main areas of virtualized information system design and operation in which security concerns must be addressed. Finally, we present our recommendations and future trends for trusted virtualized computing environments.

Original languageEnglish (US)
Title of host publicationWorld Congress on Internet Security, WorldCIS-2012
Pages117-122
Number of pages6
StatePublished - 2012
EventWorld Congress on Internet Security, WorldCIS-2012 - Guelph, ON, Canada
Duration: Jun 10 2012Jun 12 2012

Publication series

NameWorld Congress on Internet Security, WorldCIS-2012

Other

OtherWorld Congress on Internet Security, WorldCIS-2012
Country/TerritoryCanada
CityGuelph, ON
Period6/10/126/12/12

Keywords

  • security vulnerabilities
  • trusted computing
  • virtual machines
  • virtualization

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Security challenges and countermeasures for trusted virtualized computing environments'. Together they form a unique fingerprint.

Cite this