Open Access   Article Go Back

Infrastructure Virtualization Security Architecture Specification for Private Cloud

S.S. Manikandasaran1 , K. Balaji2 , S. Raja3

Section:Review Paper, Product Type: Journal Paper
Volume-06 , Issue-02 , Page no. 10-14, Mar-2018

Online published on Mar 31, 2018

Copyright © S.S. Manikandasaran, K. Balaji, S. Raja . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.S. Manikandasaran, K. Balaji, S. Raja, “Infrastructure Virtualization Security Architecture Specification for Private Cloud,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.10-14, 2018.

MLA Style Citation: S.S. Manikandasaran, K. Balaji, S. Raja "Infrastructure Virtualization Security Architecture Specification for Private Cloud." International Journal of Computer Sciences and Engineering 06.02 (2018): 10-14.

APA Style Citation: S.S. Manikandasaran, K. Balaji, S. Raja, (2018). Infrastructure Virtualization Security Architecture Specification for Private Cloud. International Journal of Computer Sciences and Engineering, 06(02), 10-14.

BibTex Style Citation:
@article{Manikandasaran_2018,
author = {S.S. Manikandasaran, K. Balaji, S. Raja},
title = {Infrastructure Virtualization Security Architecture Specification for Private Cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {06},
Issue = {02},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {10-14},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=195},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=195
TI - Infrastructure Virtualization Security Architecture Specification for Private Cloud
T2 - International Journal of Computer Sciences and Engineering
AU - S.S. Manikandasaran, K. Balaji, S. Raja
PY - 2018
DA - 2018/03/31
PB - IJCSE, Indore, INDIA
SP - 10-14
IS - 02
VL - 06
SN - 2347-2693
ER -

           

Abstract

This Infrastructure Virtualization has been in place at industry for several years, and most recently new business drivers and rapid advances technology are taking virtualization a step further. While major drivers in the past have been around cost savings via server consolidation, Public cloud and software defined datacenter and business agility has become one of the key components in overall infrastructure. This paper provides a security architecture specification for infrastructure virtualization for private cloud which includes Threat analysis, vulnerabilities, Security architecture requirements and Security architecture specifications.

Key-Words / Index Term

Security architecture; Infrastructure virtualization; Threat; Vulnerabilities

References

A. R. Riddle and S. M. Chung, "A Survey on the Security of Hypervisors in Cloud Computing," IEEE 35th International Conference on Distributed Computing Systems Workshops, Columbus, OH, pp.100-104, 2015.
[2] Arockiam, L. and Monikandan, S. and Parthasarathy G. “Cloud Computing: A Survey. International Journal of Internet Computing”, Volume 1, No. 2, , pp.26-33, 2011.
[3] A. Tolnai and S. H. von Solms, "Securing the Cloud`s Core Virtual Infrastructure" , IEEE International Conference on Broadband, Wireless Computing, Communication and Applications, Fukuoka, , pp. 447-452, 2010.
[4] K. M. Babu and P. S. Kiran, "A secure virtualized cloud environment with pseudo-hypervisor IP based technology", IEEE 2nd International Conference on Next Generation Computing Technologies (NGCT), Dehradun, pp. 626-630, 2016.
[5] Tony UcedaVelez, Marco M. Morana, “Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis”, John Wiley & sons, pp. 547, 2015.
[6] S. N. Brohi, M. A. Bamiah, M. N. Brohi and R. Kamran, "Identifying and analyzing security threats to Virtualized Cloud Computing Infrastructures", IEEE International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM), Dubai, pp. 151-155, 2012.
[7] W. Yang and C. Fung, "A survey on security in network functions virtualization", IEEE NetSoft Conference and Workshops (NetSoft), Seoul, pp. 15-19, 2016.
[8] Arockiam, L. and Monikandan S. “Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm”, International Journal of Advanced Research in Computer and Communication Engineering, Volume 2, No. 8, pp. 3064-3070, 2013.