Browse > Article
http://dx.doi.org/10.7840/kics.2013.38B.7.526

A Design of Security Structure in Bare Metal Hypervisor for Virtualized Internal Enviroment of Cloud Service  

Choi, Do-Hyeon (숭실대학교 컴퓨터학과 통신연구실)
You, Han-Na (숭실대학교 컴퓨터학과 통신연구실)
Park, Tae-Seung (숭실대학교 컴퓨터학과 통신연구실)
Do, Kyoung-Hwa (숭실대학교, 행정안전부)
Jun, Moon-Seog (숭실대학교 컴퓨터학과 통신연구실)
Abstract
With rapid rise of virtualization technology from diverse types of cloud computing service, security problems such as data safety and reliability are the issues at stake. Since damage in virtualization layer of cloud service can cause damage on all host (user) tasks, Hypervisor that provides an environment for multiple virtual operating systems can be a target of attackers. This paper propose a security structure for protecting Hypervisor from hacking and malware infection.
Keywords
Hypervisor; Virtualization; Bare Metal; Cloud Service; Cloud Computing;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 I. Y. Jung, I. Jo, and Y. Yu, "Trust assurance of data in cloud computing environment," J. KICS, vol. 36, no. 9, pp. 1066-1072, Sep. 2011.   과학기술학회마을   DOI   ScienceOn
2 HP(Analyst report), IDG Tech Dossier: Security in the New V-Era(2012), Retrieved June, 27, 2012, from http://www8.hp.com/h20195/v2/GetDocument. aspx?docname=4AA4-6716EEW.
3 Intel, Intel Virtualization Technology(2006), Retrieved June, 30, 2012, from http://www.intel.com/technology/itj/2006/v10i3 /1-hardware/5-architecture.htm.
4 Advanced Micro Devices, AMD-VTM NestedPaging(2008), Retrieved June, 25, 2012, from http://developer.amd.com/wordpress/media/201 2/10/NPT-WP-1%201-final-TM.pdf.
5 T. Grance and W. Jansen, "Guidelines on security and privacy in public cloud computing," NIST Special Publication 800-144, Dec. 2011.
6 CSA(Cloud Security Alliance), "CSA Guidance Version 3," Security Guidance for Critical Areas of Focus in Cloud Computing, Nov. 2011.
7 S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," J. Network Comput. Applicat., vol. 34, no. 1, pp. 1-11, Jan. 2010.
8 N. Gruschka and M. Jason, "Attack surfaces : a taxonomy for attacks on cloud services," in Proc. 2010 IEEE 3rd Int. Conf. Cloud Comput. (CLOUD), pp. 276-279, Miami, U.S.A., July 2010.
9 KISA(Korea Internet Security Agency) Research and Developer Team, "Cloud Service Information Security Guideline," KISA Guideline and Explanation, Oct. 2011.
10 TTA(Telecommunication Technology Association), Intrusion Detection Framework in Collaborative Cloud Environment, TTAK.KO-10.0534, Dec. 2011.