Skip to main content

Mitigating Security Threats to Large-Scale Cross Border Virtualization Infrastructures

  • Conference paper
  • 2365 Accesses

Abstract

Cloud Computing is being a computation resources platform where it is possible to make up an environment flexible and scalable able to host any kind of services. In Cloud Computing, virtualization technologies provide all the needful capabilities to deploy services and run applications in an easy way. Furthermore, large-scale cross border virtualization infrastructures present promising landscape to cope with the ever increasing requirements of modern scientific and business applications.

The large-scale cross border virtualization infrastructures can be seen as a federation of heterogeneous clouds. We present pragmatic analysis of the potential threats posed to the emerging large-scale cross border virtualization infrastructures. We have taken into consideration both internal and external threats to these infrastructures. We also drive the discussion considering a real model of cloud. In particular an infrastructure cloud is briefly presented; a useful scenario where to assess security threats and apply security solutions, that is the European Project, RESERVOIR.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Amazon Web Services: Overview of Security Processes, http://s3.amazonaws.com/aws_blog/AWS_Security_Whitepaper_2008_09.pdf

  2. Comprehensive review of security and vulnerability protections for Google Apps, http://www.google.com/a/help/intl/en/admins/pdf/ds_gsa_apps_whitepaper_0207.pdf

  3. Juan Caceres, R.M., Rochwerger, B.: Reservoir: An architecture for services, the first issue of the reservoir architecture document (June 2008), http://www.reservoir-fp7.eu/twiki/pub/Reservoir/Year1Deliverables/080531-ReservoirArchitectureSpec-1.0.PDF

  4. Dolev, D., Yao, A.C.: On the Security of Public Key Protocols. In: Proceedings of the IEEE 22nd Annual Symposium on Foundations of Computer Science, pp. 350–357 (1982)

    Google Scholar 

  5. Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud Computing and Grid Computing 360-Degree Compared. In: Grid Computing Environments Workshop, GCE 2008, November 2008, pp. 1–10 (2008)

    Google Scholar 

  6. King, S.T., Chen, P.M., Wang, Y., Verbowski, C., Wang, H.J., Lorch, J.R.: Subvirt: Implementing malware with virtual machines. In: SP 2006: Proceedings of the 2006 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 314–327. IEEE Computer Society, Los Alamitos (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

About this paper

Cite this paper

Massonet, P., Naqvi, S., Tusa, F., Villari, M., Latanicki, J. (2010). Mitigating Security Threats to Large-Scale Cross Border Virtualization Infrastructures. In: Avresky, D.R., Diaz, M., Bode, A., Ciciani, B., Dekel, E. (eds) Cloud Computing. CloudComp 2009. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, vol 34. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12636-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12636-9_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12635-2

  • Online ISBN: 978-3-642-12636-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics