A Study on the Virtualization Security Management in the Cloud Computing Environment

被引:0
作者
Cheong, Il-Ahn
Lee, Seulgi
Son, Kyungho
机构
来源
INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3 | 2013年 / 336-338卷
关键词
Virtualization Security Management; Virtual Machine Migration; Cloud Computing; VM Lifecycle; VM Status Trace;
D O I
10.4028/www.scientific.net/AMM.336-338.2035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Service providers provide virtualized IT resources by using Internet technologies in their services. Users use the provided TT resources as much as they want and pay the corresponding fee. In such cloud computing environments, issues of malicious codes, hacking and leak of confidential information are the biggest concerns of the people involved. In this paper, we study the virtualization security management, which is important for the proper management of collection of virtualization resources information and security events, monitoring and analysis of cloud security situations, and cloud security policies. Specifically, we propose the structuring of the virtualization security management system and the management method to reduce the complexity of administering the virtual machines installed in the cloud data centers caused by the inherent properties of virtual machines characterized by dynamic changes in the form of image files. Therefore, we studied the tracing method for history of infected virtual machines following an analysis of the VM lifecycle status and VM running states.
引用
收藏
页码:2035 / 2039
页数:5
相关论文
共 5 条
[1]  
Oberheide Jon., 2008, Empirical Exploitation of Live Virtual Machine Migration
[2]  
RSA, RSA C 2011
[3]  
Rutkowska J., 2006, SUBVERTING VISTA KER
[4]  
Symantec, 2011, 2011 STAT CLOUD SURV
[5]  
Youngsang S., 2013, 8 INT C INF PROC MAN