Security considerations in cloud computing virtualization environment

Sang Soo Yeo, Jong Hyuk Park

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Almost cloud service providers are having their own architectures for providing a variety of cloud services to their customers, cloud service clients. These various architectures and services increase the complexity of security management policies, frameworks, and systems, because they would require different aspects of security solutions for their own architectures and services. Consequently, such compatibility issues make us difficult to design a common security framework, security management system, or security evaluation system. Recognizing the need to solve such issues, we analyze common security elements to be required for cloud computing virtualization, and identify requirements for information protection in this paper. We also identify possible threats that may occur depending on different functions and roles over the cloud virtualization environments, and define security elements and requirements to deal with those issues. We show a set of common directions or approaches to prevent any possible treats to cloud computing, and provide more efficient and systematic method of managing and operating cloud computing system.

Original languageEnglish
Title of host publicationGrid and Pervasive Computing - 8th International Conference, GPC 2013 and Colocated Workshops, Proceedings
Pages208-215
Number of pages8
DOIs
StatePublished - 2013
Event8th International Conference on Grid and Pervasive Computing, GPC 2013 - Seoul, Korea, Republic of
Duration: 9 May 201311 May 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7861 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th International Conference on Grid and Pervasive Computing, GPC 2013
Country/TerritoryKorea, Republic of
CitySeoul
Period9/05/1311/05/13

Keywords

  • Cloud Computing Architecture
  • Cloud Computing Services
  • Security Requirement
  • Virtualization Security Layer

Fingerprint

Dive into the research topics of 'Security considerations in cloud computing virtualization environment'. Together they form a unique fingerprint.

Cite this