Virtualization Techniques: Challenges and Opportunities

  • Lyes BoualiEmail author
  • Emad Abd-Elrahman
  • Hossam Afifi
  • Samia Bouzefrane
  • Mehammed Daoui
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10026)


The gap between the deployment costs for the new services, apps and hosting machines with the expected revenue forces the operators to think in the virtualization concept although the heterogeneity in virtualization techniques solutions. While this virtualization architecture came with different challenges like instances isolation in the hardware or software layers, it anticipated many opportunities for fast deployment and resources management. This position paper lists the main challenges starting from tenants’ isolation and hardware trusting for virtualization layer till the software and network mapping issues for virtual instances communication under the softwarization techniques. Moreover, it sums up the directions for this research point in terms of the vision of software and hardware.


Virtualization VM Containers TPM SDN NFV 


  1. 1.
    Ahmad, R.W., Gani, A., Hamid, S.H.A., Shiraz, M., Yousafzai, A., Xia, F.: A survey on virtual machine migration and server consolidation frameworks for clouddata centers. J. Netw. Comput. Appl. 52, 11–25 (2015)CrossRefGoogle Scholar
  2. 2.
    Aguiar, A.D.C.P.D.: On the virtualization of multiprocessed embedded systems. Ph.D. dissertation, Pontifıcia Universidade Catolica do Rio Grande do Sul (2014)Google Scholar
  3. 3.
    Mijat, R., Nightingale, A.: Virtualization is coming to a platform near you. ARM white paper (2011)Google Scholar
  4. 4.
    Le Vinh, T., Bouzefrane, S.: Trusted platforms to secure mobile cloud computing. In: The 16th IEEE International Conference, pp. 1096–1103, August 2014Google Scholar
  5. 5.
    Liang, C., Yu, F.R.: Wireless network virtualization: a survey, some research issues and challenges. IEEE Commun. Surv. Tutor. 17(1), 358–380 (2015)CrossRefGoogle Scholar
  6. 6.
    Jain, R., Paul, S.: Network virtualization and software defined networking for cloud computing: a survey. IEEE Commun. Mag. 51, 24–31 (2013)CrossRefGoogle Scholar
  7. 7.
    Popek, G.J., Goldberg, R.P.: Formal requirements for virtualizable third generation architectures. ACM SIGOPS Oper. Syst. Rev. 17, 412–421 (1974)MathSciNetzbMATHGoogle Scholar
  8. 8.
    VMWare Inc.: Introducing VMware virtual platform. Technical white paper, February 1999Google Scholar
  9. 9.
    Understanding Full Virtualization, Para-virtualization, and Hardware Assist. VMWre white paper (2007)Google Scholar
  10. 10.
    Rodriguez-Haro, F., Freitag, F., Navarro, L., et al.: A summary of virtualization techniques. In: The 2012 Iberoamerican Conference on Electronics Engineering and Computer Science, pp. 267–272 (2012)Google Scholar
  11. 11.
  12. 12.
  13. 13.
  14. 14.
    NFV White Paper: Network Functions Virtualisation, An Introduction, Benefits, Enablers, Challenges & Call for Action, issue 1, October 2013Google Scholar
  15. 15.
    ETSI GS NFV 002 (V1.2.1): Network Functions Virtualisation (NFV); Architectural Framework, December 2014Google Scholar
  16. 16.
    ETSI GS NFV 003 (V1.2.1): Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV, December 2014Google Scholar
  17. 17.
    Mijumbi, R., Serrat, J., Gorricho, J., Bouten, N., De Turck, F., Boutaba, R.: Network function virtualization: state-of-the-art and research challenges. IEEE Commun. Surv. Tutor. PP(99), 1 (2015)Google Scholar
  18. 18.
    Hu, F., Hao, Q., Bao, K.: A survey on Software-Defined Network (SDN) and OpenFlow: from concept to implementation. IEEE Commun. Surv. Tutor. 16, 2181–2206 (2014)CrossRefGoogle Scholar
  19. 19.
  20. 20.
  21. 21.
    McKeown, N., Anderson, T., Balakrishnan, H., et al.: OpenFlow: enabling innovation in campus network. ACM SIGCOMM Comput. Commun. Rev. 38, 69–74 (2008)CrossRefGoogle Scholar
  22. 22.
  23. 23.
  24. 24.
    Perez, R., Sailer, R., van Doorn, L., et al.: vTPM: virtualizing the trusted platform module. In: Proceedings of 15th Conference on USENIX Security Symposium, pp. 305–320 (2006)Google Scholar
  25. 25.
    England, P., Loeser, J.: Para-virtualized TPM sharing. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 119–132. Springer, Heidelberg (2008). doi: 10.1007/978-3-540-68979-9_9 CrossRefGoogle Scholar
  26. 26.
    Krautheim, F.J., Phatak, D.S., Sherman, A.T.: Private virtual infrastructure: a model for trustworthy utility cloud computing. In: DTIC Document (2010)Google Scholar
  27. 27.
    Strasser, M., Stamer, H.: A software-based trusted platform module emulator. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 33–47. Springer, Heidelberg (2008). doi: 10.1007/978-3-540-68979-9_3 CrossRefGoogle Scholar
  28. 28.
    Ibn-Khedher, H., Abd-Elrahman, E., Afifi, H.: Network issues in virtual machine migration. In: ISNCC, IEEE, Hamamet, Tunisia, vol. 1, pp. 1–6, May 2015Google Scholar

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  • Lyes Bouali
    • 1
    • 2
    Email author
  • Emad Abd-Elrahman
    • 3
  • Hossam Afifi
    • 3
  • Samia Bouzefrane
    • 2
  • Mehammed Daoui
    • 1
  1. 1.LARI LabUMMTOTizi OuzouAlgeria
  2. 2.CEDRIC LabCNAMParisFrance
  3. 3.RST DepartmentInstitute Mines-TelecomSaclayFrance

Personalised recommendations