Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Security Control Variations Between In-House and Cloud-Based Virtualized Infrastructures

Published

Author(s)

Ramaswamy Chandramouli

Abstract

Virtualization-related components (such as Hypervisor, Virtual Network and Virtual Machines (VMs)) in a virtualized data center infrastructure need effective security controls. However, the differences in scope of control (among stakeholders) over this component set between in-house and cloud-based virtualized infrastructures introduce variations in security control measures that can be deployed by the respective stakeholders. In this paper, we analyze those variations and their efficiency & security impacts. We also suggest technology enablers that can minimize those impacts and improve the overall security robustness of the basic computing units of a virtualized infrastructure (i.e.,VMs).
Proceedings Title
Proceedings of the Fifth International Conference on Dependability (DEPEND 2012)
Conference Dates
August 19-21, 2012
Conference Location
Rome
Conference Title
Fifth International Conference on Dependability (DEPEND 2012)

Keywords

cloud service model, hypervisor, virtual machine, virtual network, virtualized host

Citation

Chandramouli, R. (2012), Security Control Variations Between In-House and Cloud-Based Virtualized Infrastructures, Proceedings of the Fifth International Conference on Dependability (DEPEND 2012), Rome, -1, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=911036 (Accessed March 28, 2024)
Created August 19, 2012, Updated February 19, 2017