You are on page 1of 6

IJCAT - International Journal of Computing and Technology, Volume 2, Issue 6, June 2015

ISSN : 2348 - 6090


www.IJCAT.org

Virtualization Techniques and Virtualization


Challenges in Cloud Computing: A Review
1
Bohar Singh, 2 Jagdeep Singh, 3 Sahil Kumar
1, 2, 3
CSE Department, SBSSTC, Ferozepur,
Punjab, India

Abstract - Cloud computing is a popular and growing trend


in internet technology that enhance application potentialities
in terms of functioning, collaborative execution approach
and elastic resource management. The virtualization is a
core part of cloud computing which enables engineering or
intellectual IT resources on demand dynamic allocation of
resources such as network, storage, application, server and
client. Virtualization becomes significant as a way to develop
system security, provide greater flexibility, reliability and
reduce costs. This paper describes different types of
virtualization and how it helps to expand elasticity of the
resources in cloud computing environment. This paper gives
a detailed review on various virtualization techniques,
challenges and future research direction.

Keywords - Cloud Computing, Virtualization, VM Sprawl,


Hypervisor, Challenges. Fig 1 Traditional Architecture

1. Introduction

Many year ago Virtualization [1] was came up with idea


of sharing of huge expensive resources among different
application environments. This enables an organization to
interact with their IT resources in a more efficient way
and allows for a much greater utilization. Therefore,
virtualization technologies have rapidly become a
standard piece of deployment in many IT organizations.
An example of virtualization is depicted with help of
diagram. In figure 1 traditional IT infrastructure is
depicted and in figure 2 a new IT infrastructure is
depicted that uses virtualization. An IT infrastructure can
be seen as everything that supports the flow and
processing of information such as the physical hardware
that interconnects computers and users, plus the software Fig 2 Virtual Architecture

that enables sending, receiving and management of


information. Virtualization of resources is achieved with Both IT infrastructures consist of a storage, network,
help of hypervisor [18] which allow dynamic allocation of server, operating system and application layer. In the
resources to virtual machine. traditional architecture, all the components of one layer

175
IJCAT - International Journal of Computing and Technology, Volume 2, Issue 6, June 2015
ISSN : 2348 - 6090
www.IJCAT.org

that is application are connected to a single component of virtualization difficult to manage. However the virtual
another layer. It means each server is comprised of one machine environment that provides "enough
operating system, a set of applications, a network and a representation of the underlying hardware to allow guest
storage device. The network connects the different servers operating systems to run without modification can be
and storage systems together and can also connect the considered to provide Full Virtualization.
server to other public IT infrastructures such as the
internet or private IT infrastructures from other
organizations. In figure 2 virtualization layer enables to
install number of operating system and each operating
system comprises of different number of application. In
simple words virtualization refers to technologies that are
designed to provide a layer of abstraction between layers
of hardware and software, as well as layers of software
that enables a more simplified interaction with it. There
are many different virtualization technologies that
concentrate on particular layers of the IT infrastructure
that together enable the transformation of a traditional IT
infrastructure into a virtual IT infrastructure. Currently,
there are many virtualization vendors that offer the same Fig 3 Full Virtualization
kind of virtualization technologies, but use a different
approach and implementation method underneath. Atos In this kind of setup the I/O devices are allotted to the
Origin, who is a virtualization service provider, uses guest machines by imitating the physical devices in the
virtualization technologies of different virtualization virtual machine monitor; interacting with these devices in
providers to provide suitable IT solutions according to the the virtual environment are then directed to the real
wishes of their clients, which are often large enterprises. physical devices either by the host operating system driver
or by the "hypervisor driver. As shown in fig 3 full
virtualization comes with a performance penalty, the
2. Server Virtualization
technique permits running unmodified operating system,
which is ideal, particularly when source is unavailable
Server virtualization [9] is the main virtualization domain such as with proprietary operating systems. Today there
in which a (physical) server is converted into a are number of virtualization technologies which provides
virtual server. A physical server is often used term by full virtualization such as VMware's family of
virtualization vendors to describe the difference hypervisors, Xen and XenServer from
between a virtual server and a physical server. The term Citrix, VirtualBox from Oracle and KVM from RedHat
physical server refers to the hardware that (among others).
does the actual computing processing imposed by the
software, such as operating system and 2.2 Paravirtualization
applications. A virtual server cannot operate without a
physical server. With server virtualization, Unlike full virtualization, in paravirtualization the
multiple physical servers can be converted into virtual running guest OS should be modified in order to be
servers and be placed on one physical server, operated in the virtual environment. Fig 4 depicts that
which is called the host. The virtual servers are called the paravirtualization is a subset of server virtualization,
guests. which provides a thin software interface between the host
hardware and the modified guest OS. An interesting fact
2.1 Full Virtualization in this technology is that the guest machines are aware of
the fact that they are running in a virtualized
Each virtual machine can run any operating system environment. One of the main characteristics of
supported by the underlying hardware. Besides the fact, paravirtualization technology is, the virtual machine
that this is the most commonly used virtualization monitor is simple which allows paravirtualization to
technology, true full virtualization where the virtual achieve performance closer to nonvirtualized hardware.
processors have to reproduce the CPU operations of the Device interaction in paravirtualized environment is very
host machine is hard to achieve. Moreover, the overhead similar to the device interaction in full virtualized
of handling these CPU operations makes true full environment; the virtual devices in paravirtualized

176
IJCAT - International Journal of Computing and Technology, Volume 2, Issue 6, June 2015
ISSN : 2348 - 6090
www.IJCAT.org

environment also rely on physical device drivers of the abstracting all the physical storage resources that are
underlying host scattered over the network. First the physical storage
resources are aggregated to form a storage pool which
then forms the logical storage. This logical storage which
is the aggregation of scattered physical resources appears
to be a single monolithic storage device to the user.
Examples of storage devices are storage attached network
(SAN) and network attached storage (NAS). While
storage virtualization can be used in different or a
combination of storage devices, as shown in fig 5 storage
virtualization can be broken up into two general classes:
block virtualization and file virtualization.

Fig 4 Paravirtualization

3. Other Virtualization Techniques


Fig 5 Storage Virtualization
3.1 Application Virtualization
3.4 Desktop Virtualization
In Application virtualization, the user is able to run a
server application locally using the local resources Desktop virtualization [13] is the separation of a desktop,
without needing the complexity of completely installing consisting of an operating system, applications and user
this application on his/her computer. Such virtualized data, from the underlying endpoint. The endpoint is the
applications are designed to run in a small virtual computer device which is used to access the desktop.
environment containing only the resources needed for the Desktop virtualization can be subdivided into two types:
application to execute. Thus in application virtualization “Client side” and “Server side” [14]. With server side
each user have an isolated application environment desktop virtualization, the end-user applications are
virtually. This small isolated virtual environment acts as a executed remotely, on a central server, and streamed
layer between the application and the host operating towards the endpoint via a Remote Display Protocol or
system [10]. other presentation and access virtualization technology.
Controlling a desktop from a remote location is also
3.2 Resource Virtualization called presentation or access virtualization, because the
screen images are streamed from one location to another.
Virtualizing system specific resources such as "storage With client side desktop virtualization, the applications
volumes, name spaces and the network resources is are executed at the endpoint, which is the user location,
known as resource virtualization. There are various and presented locally on the user’s computer.
approaches to perform resource virtualization. Some of
them are, Aggregating many individual components into 3.5 Network Virtualization
larger resource pool, Grid computing or computer clusters
where multiple discrete computers are combined to form a Network virtualization [6] was characterized by three
large supercomputers with enormous resources, types of technologies: Virtual LAN (VLAN), Virtual IP
partitioning a single resource such as disk space into (VIP) and Virtual Private Network (VPN). This is
number of smaller and easily accessible resources of same depicted in figure 6. Network virtualization is comprised
type. of a set of technologies that hide the true complexity of
the network and separates it into manageable parts. With
3.3 Storage Virtualization network virtualization multiple networks can be combined
into a single network, or a single network can be logically
Storage virtualization [19] is a form of Resource separated into multiple parts [3]. The currently known
virtualization, where a logical storage is created by network virtualizations are Virtual LAN (VLAN), Virtual

177
IJCAT - International Journal of Computing and Technology, Volume 2, Issue 6, June 2015
ISSN : 2348 - 6090
www.IJCAT.org

IP (VIP) and Virtual Private Network (VPN). VPN and consolidation reduces number of physical server but due
VLAN are well-known, but network virtualization is still to a large number of virtual servers it become hard to
developing and other network virtualization technologies manage. Server virtualization introduced a new issue,
are expected to make their appearance in the near future called VM sprawl.
Virtual LAN (VLAN) is a method of creating independent
networks using a shared (physical) network. It is used to Traditionally, if someone wants to deploy more servers
logically segment and control the interaction between there is a whole process of ordering hardware and
different network segments. As virtual machines are procedures, but now IT administrators can deploy virtual
aggregated onto a physical machine, it's not unlikely that servers with a click on the mouse. There is often the
they will communicate with one another. For this reason, deception that virtual machines are free. However, the
hypervisors include virtual networking abilities to deployment of new virtual machines can lead to the
optimize network traffic. Note that this implies software- requirement or purchase of additional hardware
based networking, but is commonly very efficient. A resources. Deploying a couple new virtual servers might
virtual machine, as part of its virtualized platform, is not require additional resources, but in case of
provided with a virtual NIC. This virtual NIC attaches VM sprawl, the virtual environment is characterized by
either to a physical NIC (on the physical platform) or to many redundant virtual machines that
virtual networking infrastructure within the hypervisor. inefficiently use resources. This could lead to the purchase
of more hardware, consisting of servers and
storage, and possibly additional licensing cost. Also,
while the virtual environment can be centrally
managed more IT staff might be needed to address and
solve the VM sprawl problem.

Another problem is the sharing of IT resources. As


resources are shared, the applications and data of different
departments of an organization can reside anywhere in
Fig 6 Network Virtualization the virtual environment. Different departments of an
organization are often also reluctant of the idea on
4. Virtualization Challenges: Two Challenges sharing resources with other departments and losing
control of their own resources [26]. However, new
There are still many issues with virtualization development in management tools has addressed some of
technologies. For instance, in traditional environments these problems.
there are many tools that facilitate management and
security for IT infrastructures. However, for virtual 4.2 Challenge 2: Security
environments traditional management and security
technologies are often not suitable. These are two Whereas more and more physical servers are being
virtualization challenges that were very apparent in the virtualized, security issues associated with virtualization
virtualization events [20, 21, 22]. have become more critical to address. In fact,
virtualization adds new challenges for organizations that
4.1 Challenge 1: Management require involvement of information security measures in
initial stages of virtualization projects [19]. Virtualization
Organizations that have adopted virtualization adds a new layer of software on a (physical) server and
technologies are facing a number of management issues. like any software that is written by a “human being” it can
One of management issue in organization is server contain embedded and yet to be discovered vulnerabilities
consolidation in which the number of (physical) servers that may be exploitable. When hackers get access to the
can be significantly reduced to smaller number of virtualization layer, which contains the hypervisor, all the
(physical) servers that are running multiple virtual virtual machines could be compromised.
servers. While the hardware can significantly be reduced, Furthermore, traditional security and management tools
an organization still has to manage the large number of inside an OS are not aware or designed to access, scan or
virtual servers [25]. Furthermore, server virtualization protect the virtualization layer. There are security tools for
allows organizations to easily deploy new virtual servers virtualization, called virtual security appliances. Virtual
with the click of a mouse button. Although server security appliances are security programs that are places
inside VMs. The VM is packaged with an OS and security

178
IJCAT - International Journal of Computing and Technology, Volume 2, Issue 6, June 2015
ISSN : 2348 - 6090
www.IJCAT.org

application, which can offer better performance, than [7] Goldberg, R.P. (1974). Survey of virtual machine
installing security application in each VM, due to its research. Computer, pages 34–45, 1974
dedicated approach. However, the security tools are still [8] Ray, E.; Schultz E. (2009). Virtualization security. ACM
International Conference Proceeding Series, art. no. 42
placed on top of the virtualization layer, which has its
[9] Bittman, T.J. (2008). Server virtualization trends in
drawbacks, especially if the virtualization layer is 2008: Everything changes. Gartner. 11 March 2008
compromised [23]. Another risk is the communication [10] Asma ben letaifa, Amed haji, Maha Jebalia, Sami
between virtual machines. Many virtual environments Tabbane, ―State of the Art and Research Challenges of
include the ability to create virtual networks and switches new services architecture technologies: Virtualization,
inside the host (or physical server) to enable virtual SOA and Cloud Computingǁ, International Journal of
machines to communicate directly. This traffic is not Grid and Distributed Computing 3(4), December 2010,
visible to traditional physical network-based security 69-88.
protection devices as the traffic goes through a virtual [11] Gammage, B.; Dawson, P.; Phelps, J.R.; Colville, R.J.;
Scott, D.; Margevicius, M.A.; Basso, M.;
network inside the host. Monitoring the traffic between
Haight, C.; Williams, D.; Butler, A.; Cosgrove, T.; Fabbi,
virtual machines on the same server requires security M.; Hewitt, J.; Kleynhans, S.; MacDonald, N.;
measures placed inside the host. Russell, D.; Govekar, M.; Kumar, R.; Buchanan, S.;
Passmore, R.E.; Runyon, B.; Bittman, T.J.; Mishra,
5. Conclusions and Future Work N.; Da Rold, C.; Ridder, F. (2009). Hype Cycle for
Virtualization. Gartner, 21 July 2009.
This paper discussed various virtualization techniques, [12] Murphy, A. Virtualization defined – eight different ways.
virtualization types and challenges in cloud computing White paper. DOI=http://www.f5.com/pdf/white papers
system to reduce IT costs and effective utilization of cloud /virtualization - defined-wp.pdf
resources such as rapid elastic provisioning of virtual [13] Microsoft. (2008). Desktop virtualization Strategy.
DOI=http://download.microsoft.com/download/6/F/8/6F8
machines, elastic application programming model. In
EF4EA-26BD-48EA
addition, the virtualization techniques get universal BF45BFF00A3B5990/Microsoft%20Client %20Virtualiz
support when users consider elastic resource management ation% 20Strategy%20White%20Paper_final.pdf
issues and security issues before moving into cloud. In [14] Spruijt, R. (2010). Desktop virtualization and the power
future, we aim to develop new policies, framework and of App-V and Windows DOI= http: // www.
techniques to maintain elastic resources and data brianmadden.com/blogs/rubenspruijt/archive/2010/02/22
availability, as a result, the performances of cloud services /desktop-virtualizationand-the-power-of-windows-7.aspx
could steps into next higher level. This study paper [15] Tan, S. (2010). Forecast: Understanding the
discussed various issues pertaining to cloud services Opportunities in Virtualization Consulting and
Implementation Services. Gartner. Publication Date: 11
which can be used to design strong framework for
March 2010, ID Number: G00174840
effective elastic resource management in cloud. [16] MacDonald, N. (2010). Addressing the most common
security risks in data center virtualization projects.
References Gartner. 25 Januari 2010
[17] Schumate, S. (2004). Implications of Virtualization.
[1] VMware. (2009). History of virtualization. DOI= http:// Technical Report 2004. DOI = www. dell.
www. vmware.com/virtualization/history.html. com/downloads/ global/power/ps4q04-20040152-
[2] Mell, P., Grance, T., & Grance, T. (n.d.). The NIST Shumate.pdf
Definition of Cloud Computing Recommendations of the [18] Singh, Bohar, and Pawan Luthra. "Review of Linpack
National Institute of Standards and Technology. and Cloudsimon VMM."arXiv preprint
[3] Morgan, B. (2006). Virtualization. Research Paper. arXiv:1405.6490 (2014).
DOI=http://www.windowsecurity.com/whitepapers/Virtu [19] Techtarget. What is storage virtualization? DOI = http: //
alization.html searchstorage.techtarget.com/sDefinition/0,,sid5_gci991
[4] Tan, S. (2010). Forecast: Understanding the 633,00.html.
Opportunities in Virtualization Consulting and [20] VMware Virtualisatie Forum.(2010). Agenda. DOI =
Implementation Services. Gartner. Publication Date: 11 http: // www.vmwareforum.com/vforum/nijkerk
March 2010, ID Number: G00174840 /agenda.php
[5] Ramos,S.J.C.C. 2009).Security Challenges with [21] Noordam, A.; van Loenen, R. (2010). Securing the
Virtualization. Thesis, December 2009, DOI = http: // virtual World. Presentation VMware Forum 2010. Trend
docs. di .fc.ul. pt/jspui/bitstream / 10455/3282/1/Thesis Micro
– Jramos FCUL.pdf [22] Groenhuis, R.; Smith, J. (2010). Transform the
[6] Chowdhury, M. K.; Boutaba, R. (2009). A survey of Management of Your Virtualized Datacenter.
network virtualization. Elsevier. Computer Network Presentation VMware Forum 2010 Nijkerk. VMware
54(2010) 862-876

179
IJCAT - International Journal of Computing and Technology, Volume 2, Issue 6, June 2015
ISSN : 2348 - 6090
www.IJCAT.org

[23] Padhy, Rabi Prasad, Manas Ranjan Patra, and Suresh [26] Michael Kretzschmar, S Hanigk, “Security
Chandra Satapathy. "Cloud computing: security issues management interoperability challenges for
and research challenges." International Journal of collaborative clouds”, Systems and Virtualization
Computer Science and Information Technology & Management (SVM), 2010, Proceedings of the 4th
Security (IJCSITS)1.2 (2011): 136-146. International DMTF Academic Alliance Workshop on
[24] Ahmed, Mohiuddin, et al. "An advanced survey on Systems and Virtualization Management: Standards
cloud computing and state-of-the-art research and the Cloud, pp. 43-49, October 25-29, 2010.
issues." IJCSI International Journal of Computer ISBN:978-1-4244-9181-0,DOI:
Science Issues 9.1 (2012): 1694-0814. 10.1109/SVM.2010.5674744.
[25] Gebhardt, Carl, and Allan Tomlinson. Security
consideration for virtualization. Technical report,
Department of Mathematics, Royal Holloway,
University of London, 2008.

180

You might also like