Explore chapters and articles related to this topic
Security Concerns of Virtualization in Cloud Computing
Published in T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy, Privacy and Security Challenges in Cloud Computing, 2022
Darshana A. Naik, G. Shruthi, A. Ashwitha, Pramod Sunagar
Virtualization involves the use of hypervisor or virtual machines to surround an operating system and provides the alike set of functionalities that are expected from an actual hardware device. Virtualization links VMs to physical infrastructure, but raises protection issues when users bow out physical control of their computers and files. Virtualized systems create major gaps in the security that needs to be carefully considered when implementing a sturdy and safe and sound virtualized environment. The multi-tenant essence of virtualized structures must be handled carefully to maintain good segregation within the tenants’ activities. The environment of the virtualized cloud can be exploited by a number of hypervisor hacks, virtual machines, and VM images. A detailed comparative analysis is presented on the different best practices suggested by research experts to tackle vulnerabilities to virtualization in the cloud computing framework. The future scope of the virtualization technology involves implementing a hybrid IT system to provide an end-to-end solution. Virtualization technology should strive to provide the security to the user’s data. The availability of the application all the time on cloud and also its maximum utilization is another important aspect that needs to be addressed for efficient utilization of the resources.
Industrial Internet of Things (IIoT)
Published in Chanchal Dey, Sunit Kumar Sen, Industrial Automation Technologies, 2020
Network is the most important infrastructure of the cloud computing model. Customers can customize their networks and protocols to their advantage. The different cloud services are connected via the internet. Hypervisor is a low level program (a firmware) that acts as a virtual machine manager. It helps in sharing the cloud resources among the various customers. The deployment software helps to deploy and integrate the various applications on the cloud, while the management software helps in configuring the infrastructure. The server helps in resource sharing and allocation and de-allocation, security considerations, monitoring the available resources. Distributed file system is used for storage purposes. If a particular storage fails at any given instant of time, the same can be extracted from another storage. This makes the cloud computing so versatile and robust.
Execution Environment
Published in Hamidreza Ahmadian, Roman Obermaisser, Jon Perez, Distributed Real-Time Architecture for Mixed-Criticality Systems, 2018
A. Crespo, P. Balbastre, K. Chappuis, J. Coronel, J. Fanguède, P. Lucas, J. Perez
According to the resources used by the hypervisor there are two basic types of hypervisors as described below: Type 1 hypervisors (bare-metal) run directly on the native hardware. The hypervisor is in charge of the hardware initialization, system booting and partition execution with associated dependability, real-time and security properties. XtratuM [216, 217], AIR [218] and Hyper-V [219] are bare-metal hypervisors examples and Figure 6.2 shows the generic software architecture for this approach.Type 2 hypervisors (hosted) are executed on top or inside of an operating system. The native operating system is called host operating system and the operating systems that are executed in the virtual environments as partitions are called guest operating systems. VMWare, VirtualBox, QEMU are hosted hypervisor examples and Figure 6.3 shows the generic software architecture for this approach.
Performance evaluation of windows virtual machines on a Linux host
Published in Automatika, 2020
Josip Balen, Krešimir Vdovjak, Goran Martinović
A virtual computer system [8] is known as a virtual machine, isolated software container with an operating system and applications inside. Each virtual machine is completely independent. Multiple virtual machines can be put on a single computer system enabling several operating systems and applications to run on just one host. A thin layer of software, between the virtual machine and the host is called a hypervisor or a virtual machine manager, which allows multiple operating systems to share a single hardware host. The task of virtual machine manager is to handle resources and memory allocation for the virtual machines, ensuring they cannot disrupt each other, and also to provide interfaces for higher level administration and monitoring tools [11]. System virtualization [12] has been widely used for a variety of applications: Consolidation of physical servers,Isolation of guest operating systems,Software debugging,Intrusion and fault tolerance,System migration,Entire system backup,Creating a personal cloud system,Software debugging and testing.
MQTT Vulnerabilities, Attack Vectors and Solutions in the Internet of Things (IoT)
Published in IETE Journal of Research, 2023
Ahmed J. Hintaw, Selvakumar Manickam, Mohammed Faiz Aboalmaaly, Shankar Karuppayah
Virtual Machine (VM) Escape: In this scenario, the vulnerabilities of the hyper-visor may be exploited by the VM escape. The aim of the threat is to control the underlying infrastructure that meets the requirements of businesses for its consistency in code complexity and configuration [121]. MQTT protocol is the most excellent, effective choice in environments such IoT cloud due to its lightweight nature of its message exchange and the use of publish/subscribe paradigm particularly within limited resource objects [21]. but VM escape is one of the notable threats which can exposed cloud IoT [123].
A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing
Published in Cybernetics and Systems, 2023
Ozgu Can, Fursan Thabit, Asia Othman Aljahdali, Sharaf Al-Homdy, Hoda A. Alkhzaimi
Virtualization is a critical component of the cloud as it allows several clients to use the same physical resource. According to (Wu et al. 2010), the system fits the holdings into several execution environments by creating a virtual instance of the object or tool, such as an operating system framework, servers, network resources, and capacity devices.Multi-tenancy is a multi-tenant environment that allows for sharing resources or applications in an execution context among multiple customers or clients, even if they do not share the same organizational structure.Cloud storage is a component that is protected, administered, and maintained remotely. It made the network system where clients could access the data available.The hypervisor A virtual machine monitor or supervisor is known as a hypervisor. It is an essential virtualization module. It allows running numerous Virtual Machines (VMs) on a single hardware host. As pointed out by (Feng et al. 2010), it supervises and monitors the other operating systems housed in a single physical system.Cloud Networks this component is capable of working in more than a single data center; hundreds of thousands of servers are common in data centers, according to (Feng et al. 2011). A protected infrastructure and cloud networking are necessary for the cloud to manage and construct storage efficiently.