Virtualization security for the cloud computing technology

DeepRanjanDeb 2,169 views 23 slides Aug 24, 2018
Slide 1
Slide 1 of 23
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23

About This Presentation

Virtualization reduces the number of physical servers, reducing the energy required to power and cool them and save time. It's also much faster to deploy a virtual machine than it is to deploy a new physical server. It also reduces desktop management headaches.


Slide Content

SATHYABAMA INSTITUTE OF SCIENCE AND TECHNOLOGY CHENNAI-600119 ( School of Electrical and Electronics Engineering) SEMINER ON VIRTUALIZATION SECURITY FOR CLOUD COMPUTING TECHNOLOGY Presented by: DEEP RANJAN DEB PRN-178601384011 M.E IN EMBEDDED AND IOT

OUTLINE: INTRODUCTION : LITERATURE SURVEY : WHAT IS VIRTUALIZATION : CLOUD ENABLING TECHNOLOGY : WHY VIRTUALIZATION IS SO IMPORTANT: ARCHITECTURE OF VIRTUALIZATION: VIRTUALIZATION APPLICATION AREA: VIRTUALIZATION RISKS : VIRTUALIZATION THREATS: VIRTUALIZATION SECURITY: VIRTUAL MACHINE SPRAWL: BENEFITS OF VIRTUALIZATION : CONCLUSION: FUTURE SCOPE: REFERENCES:

INTRODUCTION: In the past decade, with the unprecedented growth in tech companies and advances in cloud computing, it has become increasingly common for companies to incorporate virtualization in their data centers to fully utilize their hardware resources. According to a research done by Nemertes Research, nearly 93% of the organizations it surveyed in 2009 have deployed virtualization in their servers.

Date of published Title & Author Name Methods Advantages Disadvantages 2011 Virtualization Security Risks and Solutions of Cloud Computing Via Divide-Conquer Strategy & Xiangyang Luo For the virtualization security problem introduced by cloud computing, especially for the private cloud computing, a solution based on divide-conquer strategy is proposed. The security risks of private cloud computing virtualization can be reduced reliably. Then based on the results of risk analysis, for each kind of security risk. 2011 Virtualization security for cloud computing service & Shengmei Luo The purpose of virtual computing environment is to improve resource utilization by providing a unified integrated operating platform for users. Virtualization at all levels (system storage, and network) became important again as a way to improve system security, reliability and availability, reduce costs and provide greater flexibility. We focused on virtualization security about the present weaknesses and attacks. LITERATURE SURVEY:

Date of Published Title & Author Name Methods Advantages Disadvantages 2012 Secure Virtualization in Cloud Computing & Artem Volokyta The mechanism of monitoring of virtual machines aimed at guaranteeing increased security to cloud resources Protect them from most kinds of attack while remaining fully transparent to service users . Privacy is exposure of sensitive information stored on the platforms implies legal liability and loss of reputation. 2016 Virtualization Security- A Survey & Omnia AbdElRahem The user has the ability to flexibly create a virtual machine with the desired requirements of operating system and software and admits it to the cloud provider network and to the Internet. Virtualization has a lot of benefits in the IT infrastructure; improving total cost of ownership of one them, as it increase hardware resources’ utilization. Virtualization security about the present weaknesses and attacks.

WHAT IS VIRTUALIZATION: In computing, virtualization means to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments. Even something as simple as partitioning a hard drive is considered virtualization because you take one drive and partition it to create two separate hard drives.

CLOUD ENABLING TECHNOLOGIES:

WHY VIRTUALIZATION IS SO IMPORTANT: Virtualization reduces the number of physical servers, reducing the energy required to power and cool them and save time. It's also much faster to deploy a virtual machine than it is to deploy a new physical server. It also reduces desktop management headaches. The most important function of virtualization is the capability of running multiple operating systems and applications on a single computer or server. This means increased productivity achieved by fewer servers.

ARCHITECTURAL DIAGRAM OF VIRTUALIZATION:

VIRTUALIZATION RISKS: Inexperience Involved. Increased Channels for Attack. Change Management Control. IT Asset Tracking and Management. Securing Dormant Virtual Machines. Sharing Data between Virtual Machines.

VIRTUALIZATION THREATS: VM Escape Denial of Service Attack on VM at migration Attack on host machine Patching Vulnerability

VIRTUALIZATION SECURITY: Hypervisor Security. Host / Platform Security. Securing Communications. Security between Guests. Security between Hosts and Guests. Virtualized Infrastructure Security. Virtual Machine sprawl.

VIRTUAL MACHINE SPRAWL: Unchecked creation of new Virtual Machines(VMs). The VMs that are created for a short-term project are still using CPU, RAM and network resources and they consume storage even if they are powered off. VM sprawl could lead to a computing environment running out of resources at much quicker than expected rate.

BENEFITS OF VIRTUALIZATION: Reduced capital and operating costs. Minimized or eliminated downtime. Increased IT productivity, efficiency, agility and responsiveness. Faster provisioning of applications.

CONCLUSION: One of the main cost-saving, hardware-reducing, and energy-saving techniques used by cloud providers is virtualization. With OS virtualization each VM can use a different OS and each OS is isolated from the others. Use VMs to enabling different services to run in separate VMs on the same physical machine.

FUTURE SCOPE: Security approach for Data Migration In cloud computing. The security risks of private cloud computing virtualization can be reduced reliably, and the security level of whole private cloud computing can be enhanced. Cloud based Medical Image Exchange-security Challenges.

REFERENCES: Virtualization Security, Omnia AbdElRahem, Ayman M. Bahaa-Eldin. Virtualization-Level Security in Cloud Computing, Farzad Sabahi. Secure Virtualization in Cloud Computing, Artem Volokyta, Igor Kokhanevych, Dmytro Ivanov. Virtualization Security Risks and Solutions of Cloud Computing Via Divide-Conquer Strategy, Xiangyang Luo, Lin Yang, Linru Ma, Shanming Chu, Hao Dai Virtualization security for cloud computing service, Shengmei Luo, Zhaoji Lin, Xiaohua Chen, Zhuolin Yang, Jianyong Chen.