Securing the cloud's core virtual infrastructure

A. Tolnai, S. H. Von Solms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Cloud service providers (CSPs) should institute the necessary security controls, including restricting physical and logical access to hypervisor and other forms of employed virtualization layers. To enact relevant security measures, the core elements communicating with the hypervisor need to be secured. A proposed security model will introduce some of the aspects that need to be secured in the virtual environment to ensure a secure and sound cloud computing environment. This paper will discuss the core aspects of the virtualized architecture explaining the security risks, including a discussion pertaining to the relevant security core concepts to mitigate the risks.

Original languageEnglish
Title of host publicationProceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010
Pages447-452
Number of pages6
DOIs
Publication statusPublished - 2010
Event5th International Conference on Broadband Wireless Computing, Communication and Applications, BWCCA 2010 - Fukuoka, Japan
Duration: 4 Nov 20106 Nov 2010

Publication series

NameProceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010

Conference

Conference5th International Conference on Broadband Wireless Computing, Communication and Applications, BWCCA 2010
Country/TerritoryJapan
CityFukuoka
Period4/11/106/11/10

Keywords

  • Cloud
  • Countermeasures
  • Model
  • Security
  • Virtualization

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Securing the cloud's core virtual infrastructure'. Together they form a unique fingerprint.

Cite this