Infrastructure Virtualization Security Architecture Specification for Private Cloud
S.S. Manikandasaran1 , K. Balaji2 , S. Raja3
Section:Review Paper, Product Type: Journal Paper
Volume-06 ,
Issue-02 , Page no. 10-14, Mar-2018
Online published on Mar 31, 2018
Copyright © S.S. Manikandasaran, K. Balaji, S. Raja . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: S.S. Manikandasaran, K. Balaji, S. Raja, “Infrastructure Virtualization Security Architecture Specification for Private Cloud,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.10-14, 2018.
MLA Citation
MLA Style Citation: S.S. Manikandasaran, K. Balaji, S. Raja "Infrastructure Virtualization Security Architecture Specification for Private Cloud." International Journal of Computer Sciences and Engineering 06.02 (2018): 10-14.
APA Citation
APA Style Citation: S.S. Manikandasaran, K. Balaji, S. Raja, (2018). Infrastructure Virtualization Security Architecture Specification for Private Cloud. International Journal of Computer Sciences and Engineering, 06(02), 10-14.
BibTex Citation
BibTex Style Citation:
@article{Manikandasaran_2018,
author = {S.S. Manikandasaran, K. Balaji, S. Raja},
title = {Infrastructure Virtualization Security Architecture Specification for Private Cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {06},
Issue = {02},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {10-14},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=195},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=195
TI - Infrastructure Virtualization Security Architecture Specification for Private Cloud
T2 - International Journal of Computer Sciences and Engineering
AU - S.S. Manikandasaran, K. Balaji, S. Raja
PY - 2018
DA - 2018/03/31
PB - IJCSE, Indore, INDIA
SP - 10-14
IS - 02
VL - 06
SN - 2347-2693
ER -




Abstract
This Infrastructure Virtualization has been in place at industry for several years, and most recently new business drivers and rapid advances technology are taking virtualization a step further. While major drivers in the past have been around cost savings via server consolidation, Public cloud and software defined datacenter and business agility has become one of the key components in overall infrastructure. This paper provides a security architecture specification for infrastructure virtualization for private cloud which includes Threat analysis, vulnerabilities, Security architecture requirements and Security architecture specifications.
Key-Words / Index Term
Security architecture; Infrastructure virtualization; Threat; Vulnerabilities
References
A. R. Riddle and S. M. Chung, "A Survey on the Security of Hypervisors in Cloud Computing," IEEE 35th International Conference on Distributed Computing Systems Workshops, Columbus, OH, pp.100-104, 2015.
[2] Arockiam, L. and Monikandan, S. and Parthasarathy G. “Cloud Computing: A Survey. International Journal of Internet Computing”, Volume 1, No. 2, , pp.26-33, 2011.
[3] A. Tolnai and S. H. von Solms, "Securing the Cloud`s Core Virtual Infrastructure" , IEEE International Conference on Broadband, Wireless Computing, Communication and Applications, Fukuoka, , pp. 447-452, 2010.
[4] K. M. Babu and P. S. Kiran, "A secure virtualized cloud environment with pseudo-hypervisor IP based technology", IEEE 2nd International Conference on Next Generation Computing Technologies (NGCT), Dehradun, pp. 626-630, 2016.
[5] Tony UcedaVelez, Marco M. Morana, “Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis”, John Wiley & sons, pp. 547, 2015.
[6] S. N. Brohi, M. A. Bamiah, M. N. Brohi and R. Kamran, "Identifying and analyzing security threats to Virtualized Cloud Computing Infrastructures", IEEE International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM), Dubai, pp. 151-155, 2012.
[7] W. Yang and C. Fung, "A survey on security in network functions virtualization", IEEE NetSoft Conference and Workshops (NetSoft), Seoul, pp. 15-19, 2016.
[8] Arockiam, L. and Monikandan S. “Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm”, International Journal of Advanced Research in Computer and Communication Engineering, Volume 2, No. 8, pp. 3064-3070, 2013.