Virtualization technologies and cloud security: Advantages, issues, and perspectives: Advantages, issues, and perspectives

Roberto Di Pietro*, Flavio Lombardi

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

14 Scopus citations

Abstract

Virtualization technologies allow multiple tenants to share physical resources with a degree of security and isolation that cannot be guaranteed by mere containerization. Further, virtualization allows protected transparent introspection of Virtual Machine activity and content, thus supporting additional control and monitoring. These features provide an explanation, although partial, of why virtualization has been an enabler for the flourishing of cloud services. Nevertheless, security and privacy issues are still present in virtualization technology and hence in Cloud platforms. As an example, even hardware virtualization protection/isolation is far from being perfect and uncircumventable, as recently discovered vulnerabilities show. The objective of this paper is to shed light on current virtualization technology and its evolution from the point of view of security, having as an objective its applications to the Cloud setting.

Original languageEnglish (US)
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages166-185
Number of pages20
DOIs
StatePublished - 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11170 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Keywords

  • Cloud
  • Security
  • Virtualization

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Virtualization technologies and cloud security: Advantages, issues, and perspectives: Advantages, issues, and perspectives'. Together they form a unique fingerprint.

Cite this