Title: Virtual machine security

 

Author: Arif Khan

 

Address: Department of Computer Science and Information Technology, University of the District of Columbia, 4200 Connecticut Ave. NW, Washington, DC 20008, USA

 

Journal: Int. J. of Information and Computer Security, 2017 Vol.9, No.1/2, pp.49 - 84

 

Abstract: In the present article we have described the security of the virtual machine (VM). The virtual environment is not fully risk-proof. Various features of the virtual platform originate from the possibilities of threats. We have depicted how those threats affect the deployment of a VM in the cloud computing. Proper techniques to construct a novel defense mechanism for virtualisation have also been discussed. We need to follow some appropriate habits for deploying and using VM. In this article, those prescribed practices have also been elucidated.

 

Keywords: virtual machines; virtualisation; hypervisor; virtual machine architecture; cloud computing; virtual machine deployment; public cloud; private cloud; hybrid cloud; cloud security; VM security; encryption; networking; risk management; security audit; defence mechanisms; cryptography.

 

DOI: http://dx.doi.org/10.1504/IJICS.2017.10003599

 

Available online 01 Mar 2017

 

 

Editors Full Text AccessAccess for SubscribersPurchase this articleComment on this article