Secure virtualization for cloud computing

@article{Lombardi2011SecureVF,
  title={Secure virtualization for cloud computing},
  author={Flavio Lombardi and Roberto Di Pietro},
  journal={J. Network and Computer Applications},
  year={2011},
  volume={34},
  pages={1113-1122}
}
Cloud computing adoption and diffusion are threatened by unresolved security issues that affect both the cloud provider and the cloud user. In this paper, we show how virtualization can increase the security of cloud computing, by protecting both the integrity of guest virtual machines and the cloud infrastructure components. In particular, we propose a novel architecture, Advanced Cloud Protection System (ACPS), aimed at guaranteeing increased security to cloud resources. ACPS can be deployed… CONTINUE READING
BETA

Citations

Publications citing this paper.
SHOWING 1-10 OF 190 CITATIONS

A survey on design and implementation of out-of-band storage virtualization

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives

  • From Database to Cyber Security
  • 2018
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

CloRoFor: Cloud Robust Forensics

VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Building a security reference architecture for cloud systems

  • Requirements Engineering
  • 2014
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

A survey on resource allocation in high performance distributed computing systems

  • Parallel Computing
  • 2013
VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization

VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Inmate OS and VMM based Secured Virtualization for Cloud Encompassment

  • IJWA
  • 2018
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2010
2019

CITATION STATISTICS

  • 12 Highly Influenced Citations

  • Averaged 21 Citations per year over the last 3 years

References

Publications referenced by this paper.
SHOWING 1-10 OF 25 REFERENCES

A case for the accountable cloud

  • Operating Systems Review
  • 2010
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

A Security Management Architecture for the Protection of Kernel Virtual Machines

  • 2010 10th IEEE International Conference on Computer and Information Technology
  • 2010

Above the Clouds : A Berkeley View of Cloud Computing " - Semantic Scholar

Michael Armbrust, Armando Fox, +8 authors Matei Zaharia
  • 2009
VIEW 1 EXCERPT

Byte-unixbench: A Unix benchmark suite. /http:// code.google.com/p/byte-unixbench/S

B Smith, R Grehan, T. Yager
  • 2009

Cve-2008-4990 enomaly ecp/enomalism: Insecure temporary file creation vulnerabilities

Sam Johnston
  • /http://www.securityfocus.com/archive/1/archive/1/ 500573/100/0/threadedS,
  • 2009
VIEW 1 EXCERPT

Similar Papers

Loading similar papers…