Int. J. of Information and Computer Security   »   2017 Vol.9, No.1/2



You can view the full text of this article for Free access using the link below.



Title: Virtual machine security


Author: Arif Khan


Address: Department of Computer Science and Information Technology, University of the District of Columbia, 4200 Connecticut Ave. NW, Washington, DC 20008, USA


Abstract: In the present article we have described the security of the virtual machine (VM). The virtual environment is not fully risk-proof. Various features of the virtual platform originate from the possibilities of threats. We have depicted how those threats affect the deployment of a VM in the cloud computing. Proper techniques to construct a novel defense mechanism for virtualisation have also been discussed. We need to follow some appropriate habits for deploying and using VM. In this article, those prescribed practices have also been elucidated.


Keywords: virtual machines; virtualisation; hypervisor; virtual machine architecture; cloud computing; virtual machine deployment; public cloud; private cloud; hybrid cloud; cloud security; VM security; encryption; networking; risk management; security audit; defence mechanisms; cryptography.


DOI: 10.1504/IJICS.2017.10003599


Int. J. of Information and Computer Security, 2017 Vol.9, No.1/2, pp.49 - 84


Submission date: 29 Dec 2015
Date of acceptance: 09 May 2016
Available online: 01 Mar 2017



Editors Full text accessFree access Free accessComment on this article