Professional Documents
Culture Documents
net/publication/273393727
CITATIONS READS
18 3,138
2 authors:
Durairaj M. P. Kannan
Bharathidasan University Bharathidasan University
20 PUBLICATIONS 87 CITATIONS 8 PUBLICATIONS 22 CITATIONS
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by P. Kannan on 11 March 2015.
Abstract: Cloud computing is a modern technology that increase application potentialities in terms of functioning, elastic resource management and
collaborative execution approach. The central part of cloud computing is virtualization which enables industry or academic IT resources through on-
demand allocation dynamically. The resources have different forms such as network, server, storage, application and client. This paper focus as on
how virtualization helps to improve elasticity of the resources in cloud computing environment. In addition to, this paper gives a detailed review on open
source virtualization techniques, challenges and future research direction.
147
IJSTR©2014
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 3, ISSUE 11, NOVEMBER 2014 ISSN 2277-8616
system. The software layer creates virtual resources such as virtualization [18] that provides multiple ways to run an
CPU, memory, storage and drivers. application which is not in traditional manner. In this technique
an isolated virtualized environment or partitioning technique is
Para Virtualization: This technique provides special used to run an application.
hypercalls that substitutes the instruction set architecture of
host machine. It relates communication between hypervisor Storage Virtualization: It creates the abstraction of logical
and guest operating system to improve efficiency and storage from physical storage. Three kinds of data storage
performance. Accessing resources in para virtualization [15] are used in virtualization, they are DAS (Direct Attached
is better than the full virtualization model since all resources Storage), NAS (Network Attached Storage) and SAN (Storage
must be emulated in full virtualization model. The drawback of Area Network). DAS is the conventional method of data
this technique is to modify the kernel of guest operating storage where storage drives are directly attached to server
system using hypercalls. This model is only suitable with open machine. NAS is the shared storage mechanism which
source operating systems. connects through network. The NAS is used for file sharing,
device sharing and backup storing among machines. SAN is
Full Virtualization: Hypervisor creates isolated environment a storage device that are shared with different server over a
between the guest or virtual server and the host or server high accelerate network. Hypervisor is the software package
hardware. Operating systems directly access the hardware that controls working access to the physical hardware of host
controllers and its peripheral devices without cognizant of machine. There are two kinds of hypervisor models as hosted
virtualized environment and requirement modifications [16]. and bare metal / native. Hosted hypervisor instance operates
on top of the host operating system whereas bare metal based
3 VIRTUALIZATION TYPES hypervisor operates directly on the hardware of host machine.
There are three major types of virtualization such as Server Fig 2 shows the comparison between traditional, bare metal
virtualization, Client virtualization and Storage virtualization. and hosted models.
The architecture and categorization of virtualization techniques
are illustrated in Fig 1.
Server Virtualization: In server virtualization, single server Fig 2 Traditional Model Vs Bare Model Vs Hosted Model
performs the task of multiple servers by portioning out the
resources of an individual server across multi-environment. Majority of obstacles arises in the acceptance and
The hypervisor layer allows for hosting multiple applications development of virtualization and cloud computing are
and operating systems locally or remotely. The advantages of concerned to the basic management aspects such as data
virtualization include cost savings, lower capital expenses, leakage, virtualization security threats, data remanense issue,
high availability and efficient use of resources. privacy and elastic resource management.
Client Virtualization: This client virtualization technology Data Leakage: Organizations are in high risk of data leakage
makes the system administrator to virtually monitor and when an employee secures the access to its data stored in
update the client machines like workstation desktop, laptop cloud system. Data leakages [19] are happens through
and mobile devices. It improves the client machines hacking data location, securing remote access, third party
management and enhances the security to defend from storage and unsecure multitenant environment in hypervisor
hackers and cybercriminals. There are three types of client level. Cloud provider or broker can enhance the prevention
virtualization [17]. First, remote or server hosted virtualization and detection mechanism and implement the collaborative
which is hosted on a server machine and operated by the security policy in hypervisor level to protect data from data
client across a network. Second, local or client hosted leakage.
virtualization in which the secured and virtualized operating
environment runs on local machine. Third, application
148
IJSTR©2014
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 3, ISSUE 11, NOVEMBER 2014 ISSN 2277-8616
Virtualization Security Threats: Security threats [20] in destruction time policy among cloud provider, broker and user
virtualization are classified into virtual machine threat, once the data reach their expiration period. Third concern is
hypervisor threat, virtual infrastructure and virtual network data breaches which studies on how data breaches occur and
threat. The virtual machine threat surfaces while processing who are going to take responsibility if data breach occurs in
status of virtual machine, software updates, resource cloud. When a user opt for using cloud services, the user
contention, patching and virtual machine conurbation. should read the terms and conditions thoroughly before
Hypervisor threat rivets Virtual-Machine-Based Rootkit prompt to cloud. The fourth concern is on regular auditing and
(VMBR) attack and Blue Pill Attack [21] where hypervisor monitoring policies. Cloud clients should constantly monitor /
plays the vital role of Virtualization. Virtual infrastructure audit the activities of cloud service provider to ensure their
threats are concerted on physical access threat and single stakeholder personal information will not be leaked while cloud
point of control threat. Virtual network threats can be resources are sharing with others.
effectively addressed by the security tools of intrusion
detection, prevention mechanism, virtual switches and Elastic Resource Management: Cloud computing system
networks conferring to the requirements. produce new disputes because of system clusters and high
volume data generated by these systems. In order to work
Data Remanence issue [22]: Once the life time of data is effective elastic resource management, we need to look at the
used, then it will be deleted in secure manner and cannot be issues such as resource allocation, resource provisioning,
recovered by malicious users. In traditional manner, company resource mapping and resource adaptation [24][25][26][27].
has all control of their servers which can be overwrite the used Cloud services encounter issues on the requirements of
data. But in cloud, the end user/cloud users are not given service level elasticity and availability. The high performance
secure delete access to the cloud provider physical device. of cloud can be achieved through implementing effective
Cloud provider should focus to ensure no data will be elastic resource management techniques as a result user
recovered by any malicious users. could get efficient services from service providers. Table 1
represents the virtualization techniques from open source
Privacy: Privacy [23] becomes a major concern among cloud providers like Redhat, Citrix systems, Oracle, OpenVZ, Linux-
users’ data which is stored in the data center of cloud service vserver and Proxmox. In the table, we compare different
providers physically located in different places. In cloud, there hypervisor models with different virtualization techniques. As
are some circumstances which lead to the privacy threats. we discussed in earlier sections, virtualization is the concept of
First, the storage issues that surface when user store data in creating virtual resources from physical resources such as
multiple storage locations which are hidden from the user and operating systems, network and storage components.
have the possibilities of transferring data without owner’s
permission. Second major concern is to ensure the
TABLE 1
COMPARISON OF OPEN SOURCE BASED HYPERVISOR VIRTUALIZATION TYPES
Virtualization Types
S. No Hypervisor Company Hypervisor
Name Full Para Hardware Operating
Model
Assisted System
149
IJSTR©2014
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 3, ISSUE 11, NOVEMBER 2014 ISSN 2277-8616
5 CONCLUSION AND FUTURE WORK Proc. Int Cloud and Service Computing (CSC) Conf, 2011,
This paper discussed various virtualization techniques, pp. 321–329.
virtualization types, hypervisor techniques and challenges in
cloud computing system to reduce IT costs and effective [11] W. Dawoud, I. Takouna, and C. Meinel, ―Infrastructure as
utilization of cloud resources such as rapid elastic provisioning a service security: Challenges and solutions‖, in Proc.
of virtual machines, elastic application programming model. In Informatics and Systems (INFOS), 2010 The 7th
addition, the virtualization techniques get universal support International Conference on, 2010, pp. 1 –8.
when users consider elastic resource management issues and
security issues before moving into cloud. In future, we aim to [12] Calheiros RN, Buyya R, De Rose CAF, ―Building an
develop new policies, framework and techniques to maintain automated and self-configurable emulation testbed for grid
elastic resources and data availability, as a result, the applications‖, Software: Practice and Experience, April
performances of cloud services could steps into next higher 2010; Vol. 40(5), Pp. 405–429.
level. This study paper discussed various issues pertaining to
cloud services which can be used to design strong framework [13] A. Whitaker, M. Shaw, S. D. Gribble, ―Denali: Lightweight
for effective elastic resource management in cloud. virtual machines for distributed and networked
applications‖, Tech. rep. (Feb. 08 2002).
REFERENCES
[1] P. Mell, T. Grance, ―The NIST Definition of Cloud [14] IBM, ―IBM systems virtualization‖, version 2 release 1,
Computing‖, National Institute of Standards and http://publib.boulder.ibm.com/infocenter/eserver/v1r2/topic
Technology, Information Technology Laboratory, /eicay/eicay.pdf (2005).
Technical Report Version 15, 2009.
[15] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A.
[2] S. Perez, ―Mobile cloud computing: $9.5 billion by 2014‖, Ho, R. Neugebauer, I. Pratt, and A. Warfield, ―Xen and the
http://exoplanet.eu/catalog.php, 2010. art of virtualization‖, In SOSP ’03: Proceedings of the
nineteenth ACM symposium on operating systems
[3] White Paper, ―Mobile Cloud Computing Solution Brief,‖ principles (New York, NY, USA, 2003), ACM Press, pp.
AEPONA, November 2010. 164–177.
[4] B. Loganayagi, S. Sujatha, ―Creating virtual platform for [16] Asma ben letaifa, Amed haji, Maha Jebalia, Sami
cloud computing‖, IEEE International Conference on Tabbane, ―State of the Art and Research Challenges of
Computational Intelligence and Computing Research new services architecture technologies: Virtualization,
(ICCIC 2010), 28-29 Dec. 2010, pp.1-4. SOA and Cloud Computing‖, International Journal of Grid
and Distributed Computing 3(4), December 2010, 69-88.
[5] Dawei Sun, Guiran Chang, Qiang Guo, Chuan Wang,
Xingwei Wang., ―A Dependability Model to Enhance [17] IBM Virtual Infrastructure Access Service Product.
Security of Cloud Environment Using System-Level https://www-
Virtualization Techniques‖, First International Conference 935.ibm.com/services/au/gts/pdf/end03005usen.pdf.
on Pervasive Computing, Signal Processing and
Applications (PCSPA); 2010, pp.305-310. [18] B. Siddhisena, Lakmal Wruasawithana, Mithila Mendis,
―Next generation muti tenant virtualization cloud
[6] Karen Scarfone, Murugiah Souppaya, and Paul Hoffman, computing platform‖, In: Proceedings of 13th International
―Guide to Security for Full Virtualization Technologies‖, conference on advanced communication
Special Publication 800-125, National Institute of technology(ICACT), vol. 12, no.3; 2011. p.405–10.
Standards and Technology (NIST), 2011.
[19] C. Almond, "A Practical Guide to Cloud Computing
[7] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Security," 27 August 2009.
Ho, R. Neugebauer, I. Pratt, A. Warfield, ―Xen and the art
of virtualization‖, in: Proc. 19th ACM Symposium on [20] Timur Mirzoev, Baijian Yang, "Securing Virtualized
Operating Systems Principles, SOSP 2003, Bolton Datacenters", International Journal of Engineering
Landing, USA, Oct. 2003. Research & Innovation, vol. 2, no. 1, spring 2010.
[8] Joanna Rutkowska and Alexander Tereshkin, ―Bluepilling [21] J. Rutkowska, "Subverting Vista Kernel For Fun and
the Xen Hypervisor‖, Xen 0wning Trilogy part III, Black Hat Profit", Aug 2006, Black Hat conference.
USA, aug 2008. http://blackhat.com/presentations/bh-usa-06/BH-US-06-
Rutkowska.pdf.
[9] Samuel T. King, Peter M. Chen, Yi min Wang, Chad
Verbowski, Helen J. Wang, and Jacob R. Lorch, ―Subvirt: [22] Tim Mather, Subra Kumaraswamy, Shahed Latif, ―Cloud
Implementing Malware with Virtual Machines‖, In IEEE Security and Privacy: An Enterprise Edition on Risks and
Symposium on Security and Privacy, 2006. Compliance (Theory in Practice)‖, O’Reilly Media,
Sep.2009; ISBN:
[10] Z. Pan, Q. He, W. Jiang, Y. Chen, and Y. Dong, 9780596802769.http://oreilly.com/catalog/9780596802776
―Nestcloud: Towards practical nested virtualization,‖ in
150
IJSTR©2014
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 3, ISSUE 11, NOVEMBER 2014 ISSN 2277-8616
151
IJSTR©2014
View publication stats
www.ijstr.org