Virtualization security:the good,the bad and the ugly
The virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security services for upper-level software.On the other side...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2016-10-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00091 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530352975216640 |
---|---|
author | Yu-tao LIU Hai-bo CHEN |
author_facet | Yu-tao LIU Hai-bo CHEN |
author_sort | Yu-tao LIU |
collection | DOAJ |
description | The virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security services for upper-level software.On the other side,the extra indirection brings complexity and overhead as well,which poses huge challenges.A series of recent representative work done by the institute of parallel and distributed system shanghai jiaotong university,including providing security services of trusted execution environment,virtual machine monitoring,intra-domain isolation,as well as optimizing trusted computing base and cross-world calls in the virtualization environment.Finally the problems and directions in the space of virtualization security were summarized. |
format | Article |
id | doaj-art-23f2a77f14f94976b1e2723a3a005aca |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2016-10-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-23f2a77f14f94976b1e2723a3a005aca2025-01-15T03:04:56ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-10-012172859548541Virtualization security:the good,the bad and the uglyYu-tao LIUHai-bo CHENThe virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security services for upper-level software.On the other side,the extra indirection brings complexity and overhead as well,which poses huge challenges.A series of recent representative work done by the institute of parallel and distributed system shanghai jiaotong university,including providing security services of trusted execution environment,virtual machine monitoring,intra-domain isolation,as well as optimizing trusted computing base and cross-world calls in the virtualization environment.Finally the problems and directions in the space of virtualization security were summarized.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00091virtualization securitytrusted execution environmentvirtual machine introspectionintra-domain isolationtrusted computing basecross-world call |
spellingShingle | Yu-tao LIU Hai-bo CHEN Virtualization security:the good,the bad and the ugly 网络与信息安全学报 virtualization security trusted execution environment virtual machine introspection intra-domain isolation trusted computing base cross-world call |
title | Virtualization security:the good,the bad and the ugly |
title_full | Virtualization security:the good,the bad and the ugly |
title_fullStr | Virtualization security:the good,the bad and the ugly |
title_full_unstemmed | Virtualization security:the good,the bad and the ugly |
title_short | Virtualization security:the good,the bad and the ugly |
title_sort | virtualization security the good the bad and the ugly |
topic | virtualization security trusted execution environment virtual machine introspection intra-domain isolation trusted computing base cross-world call |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00091 |
work_keys_str_mv | AT yutaoliu virtualizationsecuritythegoodthebadandtheugly AT haibochen virtualizationsecuritythegoodthebadandtheugly |