hypervisor security
Recently Published Documents


TOTAL DOCUMENTS

4
(FIVE YEARS 1)

H-INDEX

2
(FIVE YEARS 0)

Author(s):  
Paul Cullum ◽  
Paul Cullum

The use of virtualization can be attributed to the success of cloud computing. However, usage of a hypervisor in a shared environment among mistrusting users presents significant challenges. This paper surveys the works on host hypervisor security issues presented in cloud computing, performing a short review of current literature on the subject. Addressing several key topics, namely threats and known attacks against the hypervisor or a virtual machine (vm) that exist in a shared environment. This paper also contains a thorough review and comparison of the current solutions and proposed mitigations for the known attacks and identifies any potential gaps. Aiming to uncover if a hypervisor can provide the level of confidentiality, integrity and availability expected by cloud consumers. Research is critically analyzed and consideration for each solutions suitability of implementation in an Infrastructure as a Service (IaaS) environment is applied, including the impact on performance, if any.


2016 ◽  
Vol 9 (3) ◽  
pp. 157 ◽  
Author(s):  
Esmaeil Mehraeen ◽  
Marjan Ghazisaeedi ◽  
Jebraeil Farzi ◽  
Saghar Mirshekari

<p><strong>BACKGROUND:</strong> Healthcare data are very sensitive records that should not be made available to unauthorized people in order for protecting patient's information security. However, in progressed technologies as cloud computing which are vulnerable to cyber gaps that pose an adverse impact on the security and privacy of patients’ electronic health records and in these situations, security challenges of the wireless networks need to be carefully understood and considered. Recently, security concerns in cloud computing environment are a matter of challenge with rising importance.</p><p><strong>OBJECTIVE:</strong> In this study a systematic review to investigate the security challenges in cloud computing was carried out. We focused mainly on healthcare cloud computing security with an organized review of 210 full text articles published between 2000 and 2015.</p><p><strong>METHOD:</strong> A systematic literature review was conducted including PubMed, Science direct, Embase, ProQuest, Web of science, Cochrane, Emerald, and Scopus databases.</p><p><strong>FINDINGS:</strong> Using the strategies described, 666 references retrieved (for research question one 365, research question two 201, and research question three 100 references).</p><p><strong>IMPROVEMENTS:</strong> Review of articles showed that for ensuring healthcare data security, it is important to provide authentication, authorization and access control within cloud's virtualized network. Issues such as identity management and access control, Internet-based access, authentication and authorization and cybercriminals are major concerns in healthcare cloud computing. To manage these issues<strong> </strong>many involved events such as Hybrid Execution Model, VCC-SSF, sHype Hypervisor Security Architecture, Identity Management, and Resource Isolation approaches<em> </em>have to be defined for using cloud computing threat management processes.</p>


2015 ◽  
Vol 115 (17) ◽  
pp. 38-42 ◽  
Author(s):  
Tanu Shree ◽  
Mukesh Kumar ◽  
Neelender Badal

Sign in / Sign up

Export Citation Format

Share Document