فصلنامه تخصصی فناوری اطلاعات و ارتباطات

بسوی مجازی سازی ایمن در محیط های رایانش ابری

نویسنده

گروه مهندسی برق و کامپیوتر، موسسه آموزش عالی رجاء، قزوین، ایران

10.22034/apj.2022.704029
چکیده
رایانش ابری یک مدل پردازشی است که به دلایل قابلیت انعطاف پذیری، گسترش سریع و
هزینه پایین، مورد توجه پژوهشگران قرارگرفته و استفاده اشتراکی سرویس ها را بدون نیاز به
حق مالکیت و مدیریت منابع در محیط شبکه فراهم مینماید. از طرف دیگر محاسبات ابری
استخری از منابع کامپیوتری مجازی می باشد. مجازی سازی منابع در محاسبات ابری اجازه
می دهد تا وظایف سنگین با سرعت بیشتر و با وابستگی کمتری به منابع فیزیکی انجام شود.
با اینکه محاسبات ابری بین کاربران محبوبیت زیادی یافت ولی مشکلات امنیتی به عنوان یک
مانع بزرگ در مقابل استفاده کاربران از سیستم های محاسبات ابری قلمداد می شود. امنیت
داده و امنیت مجازی سازی دو مسئله امنیتی مهم در محاسبات ابری می باشد. که ما در این
مقاله به بررسی ابعاد امنیت مجازی سازی در محیط های رایانش ابری می پردازیم.

کلیدواژه‌ها


عنوان مقاله English

Toward Safe Virtualization Solutions in Cloud Computing Environments

نویسنده English

Laleh Akbari
Department of Electrical Engineering, Raja University Of Qazvin, Qazvin, Iran
چکیده English

Cloud computing is a processing model that has attracted the attention of researchers due to its flexibility, rapid expansion and low cost, and it provides the shared use of services without the need for ownership and management of resources in the network environment. On the other hand, cloud computing is a pool of virtual computer resources. Resource virtualization in cloud computing allows heavy tasks to be performed faster and with less dependence on physical resources. Although cloud computing has become very popular among users, security problems are considered as a big obstacle for users to use cloud computing systems. Data security and virtualization security are two important security issues in cloud computing. In this article, we examine the dimensions of virtualization security in cloud computing environments.

کلیدواژه‌ها English

Cloud Computing
Virtualization
Security
Infrastructure
Protocol
[1]          Shackleford, D. (2012). Virtualization security: protecting virtualized environments. John Wiley & Sons.
[2]          Manikandasaran, S. S., Balaji, K., & Raja, S. (2018). Infrastructure virtualization security architecture specification for private cloud. International Journal of Computer Sciences and Engineering, 6(02), 10-14.
[3]          Tsai, H. Y., Siebenhaar, M., Miede, A., Huang, Y., & Steinmetz, R. (2011). Threat as a service?: Virtualization's impact on cloud security. IT professional, 14(1), 32-37.
[4]          Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115.
[5]          Mishra, A., Mathur, R., Jain, S., & Rathore, J. S. (2013). Cloud computing security. International Journal on Recent and Innovation Trends in Computing and Communication, 1(1), 36-39.
[6]          Ibrahim, A. S., Hamlyn-Harris, J., & Grundy, J. (2016). Emerging security challenges of cloud virtual infrastructure. arXiv preprint arXiv:1612.09059.
[7]          Alwakeel, A. M., Alnaim, A. K., & Fernandez, E. B. (2018, April). A survey of network function virtualization security. In SoutheastCon 2018 (pp. 1-8). IEEE.
[8]          Zhang, N., Liu, D., & Zhang, Y. (2013, November). A research on cloud computing security. In 2013 International Conference on Information Technology and Applications (pp. 370-373). IEEE.
[9]          Pan, W., Zhang, Y., Yu, M., & Jing, J. (2012). Improving virtualization security by splitting hypervisor into smaller components. In Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012. Proceedings 26 (pp. 298-313). Springer Berlin Heidelberg.
[10]          Gurav, U., & Shaikh, R. (2010, February). Virtualization: a key feature of cloud computing. In Proceedings of the International Conference and Workshop on Emerging Trends in Technology (pp. 227-229).
[11]          Kazim, M., Masood, R., Shibli, M. A., & Abbasi, A. G. (2013). Security aspects of virtualization in cloud computing. In Computer Information Systems and Industrial Management: 12th IFIP TC8 International Conference, CISIM 2013, Krakow, Poland, September 25-27, 2013. Proceedings (pp. 229-240). Springer Berlin Heidelberg.
[12]          Chen, L., Xian, M., Liu, J., & Wang, H. (2020, April). Research on virtualization security in cloud computing. In IOP conference series: materials science and engineering (Vol. 806, No. 1, p. 012027). IOP Publishing.
[13]          Luo, X., Yang, L., Ma, L., Chu, S., & Dai, H. (2011, November). Virtualization security risks and solutions of cloud computing via divide-conquer strategy. In 2011 Third International Conference on Multimedia Information Networking and Security (pp. 637-641). IEEE.
[14]          AbdElRahem, O., Bahaa-Eldin, A. M., & Taha, A. (2016, December). Virtualization security: A survey. In 2016 11th International Conference on Computer Engineering & Systems (ICCES) (pp. 32-40). IEEE.
Luo, S., Lin, Z., Chen, X., Yang, Z., & Chen, J. (2011, December). Virtualization security for cloud computing service. In 2011 International Conference on Cloud and Service Computing (pp. 174-179). IEEE