A Research on KVM-Based Virtualization Security

Article Preview

Abstract:

Cloud computing is one of the most significant shifts in recent years. Cloud computing development brings the revolution to todays business models. The topic of cloud computing has become a hot topic in the ICT industry. Virtualization techniques as a symbol of cloud computing evolve fast. For example, KVM is a typical virtualization solution. However, its security issues aroused by the characteristic of open source may hinder subscriber to employ it. In order to address current security issues in KVM virtualization environment, this paper deeply analyzes KVM hypervisor and VM security problems, proposes KVM-based virtualization security framework, and discusses its related security mechanisms. Also, Linux OS built-in security mechanisms including SELinux and cgroups are discussed. By investigate Hypervisor, VM, and external management tools connection security issues, this open source-based virtualization ecosystem can be protected better than ever.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3126-3129

Citation:

Online since:

March 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] YamunaDevi L, Aruna P, Sudha D D, Priya N. Security in Virtual Machine Live Migration for KVM[C]. 2011 International Conference on Process Automation, Control and Computing (PACC), pp.1-6, (2011).

DOI: 10.1109/pacc.2011.5979008

Google Scholar

[2] Govindan S, Jeonghwan C, Nath A R, Das A, Urgaonkar B, Anand S. Xen and Co. Commun-ication-Aware CPU Management in Consolidated Xen-Based Hosting Platforms[J]. IEEE Transact-ions on Computers, Vol. 58 , No. 8, pp.1111-1125, (2009).

DOI: 10.1109/tc.2009.53

Google Scholar

[3] Padala P. Resource Management in VMware Powered Cloud: Concepts and Techniques[C]. IEEE 27th International Symposium on Parallel & Distributed Processing (IPDPS), p.581, (2013).

DOI: 10.1109/ipdps.2013.122

Google Scholar

[4] Kovalenko, T. Server virtualization management of corporate network with Hyper-V[C]. 2012 International Conference on Modern Problems of Radio Engineering Telecommunications and Computer Science (TCSET), p.381, (2012).

Google Scholar

[5] Redhat Enterprise Linux, Available on http: /www. redhat. com/products/enterprise-linux.

Google Scholar

[6] CentOS, Available on http: /www. centos. org.

Google Scholar

[7] Fedora project, Available on http: /fedoraproject. org.

Google Scholar

[8] Ming-Chao C, Tse-Chen Y, Guo-Fu T. A QEMU and SystemC-Based Cycle-Accurate ISS for Performance Estimation on SoC Development[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 30, No. 4, pp.593-606, (2011).

DOI: 10.1109/tcad.2010.2095631

Google Scholar

[9] Khan R H, Ylitalo J, Ahmed A S. OpenID authentication as a service in OpenStack[C]. 7th International Conference on Information Assurance and Security (IAS), pp.372-377, (2011).

DOI: 10.1109/isias.2011.6122782

Google Scholar

[10] Shabtai A, Fledel Y, Elovici Y. Securing Android-Powered Mobile Devices Using SELinux[J]. IEEE Security & Privacy, Vol. 8, No. 3, 36-44, (2010).

DOI: 10.1109/msp.2009.144

Google Scholar

[11] cgroups component, Available on http: /en. wikipedia. org/wiki/Cgroups.

Google Scholar