ArticlePDF Available

Abstract and Figures

Cloud computing, the technology that makes it possible for computing resources to be provisioned to clients / subscribers over long distances, as well as its component technology – virtualization, which makes it possible for multiple guest systems to co-reside on a single host machine and share the computing resources of the host, have both become very popular technologies that have witnessed giant improvements in the 21 st century. This is a review paper that presents an overview of the technologies of virtualization and cloud computing, tracing their history and evolution down a timeline to what they have today, and providing pointers to prospects of future advancements to virtualization and cloud computing.
Content may be subject to copyright.
Journal of Computer Sciences and Applications, 2014, Vol. 2, No. 3, 40-43
Available online at http://pubs.sciepub.com/jcsa/2/3/1
© Science and Education Publishing
DOI:10.12691/jcsa-2-3-1
On the Evolution of Virtualization and Cloud
Computing: A Review
Awodele Oludele, Emmanuel C. Ogu*, Kuyoro ‘Shade, Umezuruike Chinecherem
Department of Computer Science and Information Technology, School of Computing and Engineering Sciences, Babcock University,
Ilisan-Remo, Ogun State. Nigeria
*Corresponding author: ecoxd1@yahoo.com
Received November 27, 2014; Revised December 20, 2014; Accepted December 25, 2014
Abstract Cloud computing, the technology that makes it possible for computing resources to be provisioned to
clients / subscribers over long distances, as well as its component technology virtualization, which makes it
possible for multiple guest systems to co-reside on a single host machine and share the computing resources of the
host, have both become very popular technologies that have witnessed giant improvements in the 21st century. This
is a review paper that presents an overview of the technologies of virtualization and cloud computing, tracing their
history and evolution down a timeline to what they have today, and providing pointers to prospects of future
advancements to virtualization and cloud computing.
Keywords: virtualization, cloud computing, computing resources, clients / subscribers
Cite This Article: Awodele Oludele, Emmanuel C. Ogu, Kuyoro „Shade, and Umezuruike Chinecherem, On
the Evolution of Virtualization and Cloud Computing: A Review.” Journal of Computer Sciences and
Applications, vol. 2, no. 3 (2014): 40-43. doi: 10.12691/jcsa-2-3-1.
1. Introduction
With the successful delivery of the first message over
the Advanced Research Projects Agency Network
(ARPANet) at the peak of the American Cold War, it was
instilled in the minds of the over 1000 witnesses present
that a technological revolution was soon to be born. The
possibility of remote access to files was confirmed. On
January 1, 1983, with the successful establishment of the
first TCP/IP communication, the internet was birthed [1].
The advent of the Internet was welcomed and found its
first use in research and academics. But as the internet
grew over the years, it gradually crawled out of the
domain of research and academics to playing vital roles in
healthcare and in the workings of various governments
and economies [2,3], and this helped to further convince
cynics that this new technology had come to stay.
2. Technological Evolution
The birth of the internet was however, foretold about
two decades earlier when John McCarthy, speaking at the
MIT Centennial in 1961 was quoted as saying, “If
computers of the kind I have advocated become the
computers of the future, then computing may someday be
organized as a public utility just as the telephone system is
a public utility... The computer utility could become the
basis of a new and important industry. [4] Little did he
know that it wasn‟t going to be very long before this
dream of his came to reality.
By the 1970s, mainframe users saw the first
implementation of virtualization and symmetric
multiprocessing, where different users could use the
resources of a single machine to execute different processes
concurrently. But as the Internet continued to expand,
organizations, researchers and academicians began to
grapple with concerns relating to the high cost of
computers at the time and only sparsely intermittent
computational needs; they could not justify investing at
high costs in a computer that would be idle for most of the
time. To assuage theseconcerns, entrepreneurs came up
with the idea of “renting” time, making it possible for
organizations and users to either own or subscribe to
computing resources at much lower costs [5].
It now became possible for users to access large-scale
mainframe computer systems from thin clients/terminal
machines, often referred to as “static terminals” (see Figure 1)
because they were used mainly for communications but
had no internal processing capabilities. This idea helped to
enhance the efficiency of expensive mainframe systems
and reduce idle periodsby allowing multiple users to share
both the physical access to the computer from multiple
terminals as well as the processing resources (CPU time);
thus, allowing for greater returns on investment for
companies that practiced such [6]. It is this technology
that evolved through various nomenclatures such as
Remote Job Entry in the 1950s [7], Shared and Dedicated
Web Hosting (which are forms of Virtual Web Hosting)
around 1995 to 1997 [8,9], Virtual Private Server (VPS)
Hosting around 1998 [10], Grid/Utility Computing [5,11]
to become Cloud Computing (CC) about three decades later.
Following the standardization of the Internet and its
protocols in the 1990s, around 1995, the company
41 Journal of Computer Sciences and Applications
SalesForce began hosting and distributing customer
relationship management software over the internet on a
subscription basis. The company hosted a platform on
their servers that enabled application developers to build
applications that could be hosted on these servers. This
was one of the pioneer instances of hardware
virtualization, which loosely means, “hosting a computer
inside another computer”, and cloud computing [12].
Figure 1. Early years of Cloud Computing [13]
3. Cloud Computing
Cloud Computing (CC) is defined by the United States
National Institute of Standards and Technology (NIST) as
“a model for enabling ubiquitous, convenient, on-demand
network access to a shared pool of configurable
computing resources (e.g., networks, servers, storage,
applications, and services) that can be rapidly provisioned
and released with minimal management effort or service
provider interaction; having characteristics of on-demand
self-service, broad network access, resource pooling, rapid
elasticity and payment per usage of various business
models. [14] Cloud computing services are delivered
through three standardized service models: the
Infrastructure as a Service (IaaS), Platform as a Service
(PaaS) and the Software as a Service (SaaS) Models.
Figure 2 illustrates the service models of cloud computing,
and some popular services that are provided through these
models.
Figure 2. Cloud Computing Service Models[15]
The first / foundational layer of Cloud Computing is the
IaaS layer. The products here relate to hardware and
associated services such as: general processing, servers,
storage devices, database management, and all other
hardware related services that are offered as a service to
the end user. The next layer is the PaaS layer upon which
developers can build and test applications that run on the
IaaS, either for the IaaS layer itself or for the SaaS layer
above it. The topmost layer is the SaaS, and this deals
exclusively with applications for end users [16].
CC service models today are deployed either as Private
Clouds (cloud infrastructure provisioned for exclusive use
by a single organization comprising multiple consumers),
Community Clouds (cloud infrastructure provisioned for
exclusive use by a specific community of consumers from
organizations that have shared concerns such as: mission,
security requirements, policies, and compliance
considerations), Public Clouds (cloud infrastructure
provisioned for open use by the general public) or Hybrid
Clouds (cloud infrastructure comprising two or more
distinct cloud infrastructures, whether private, community,
or public, that remain unique entities, but are bound
together by standardized or proprietary technology
enabling data and application portability, such as cloud
bursting for load balancing, between clouds). The
interactions between these various modes of deployment
are illustrated in Figure 3 [16].
Figure 3. IaaS Deployment Variants[16]
4. Virtualization
Virtualization is the technology that allows multiple
Virtual Machines (also called guest machines) to run on a
single physical machine (also called host machine) and
share the resources of the physical machine [17]. This
makes it possible for a single physical server to host many
guest virtual machines (VMs), operating systems, and
applications without the additional cost and complexity
that result from running these multiple physical machines
individually [18].
Virtualization could occur in various forms. It could be
server-based [22], system based [19], storage virtualization
[27], desktop virtualization [28] or network virtualization
[26]. It could also be hypervisor-based (if a piece of software
known as a hypervisor or virtual machine monitor is used
to achieve virtualization) or non-hypervisor-based.
Despite variations in organization and architectural
implementations, the following core components are
generic to virtualization as shown in Figure 4 below:
Figure 4. Core Components in Virtualized Architectures (Source: [19])
Journal of Computer Sciences and Applications 42
Virtualization is a very fundamental technology that
lies at the heart of the operations of modern Cloud
Computing Infrastructure [19]. This technology is
important to cloud computing because it provides the
abstraction that cloud computing enjoys by taking a
physical resource such as a server and dividing it into
virtual resources called virtual machines (multiple
subscribers). In case of server consolidation, many small
physical servers are replaced by one larger physical server,
to increase the utilization of costly hardware resources
such as CPU time [20]. The interactions that take place
between the technologies of virtualization and cloud
computing are illustrated in Figure 5.
Figure 5. Virtualization and Cloud Computing[21]
The abstraction from the hardware state provided by
virtualization allows not only multiple operating systems
to coexist on the same hardware, but for one VMM to run
on multiple different networked physical systems
concurrently [19].
5. Cloud Computing in the 21st Century
Two additional factors that have significantly
distinguished this new technology from its predecessors
and greatly altered its market dynamics in recent years are
the speed, dynamism and “far-reach” of the Internet,
which makes it possible to transport and deliver
computational resources at high speeds, across long
distances, and at reduced cost; and the ubiquity of
personal computers coupled with the tendency to own
computers that satisfy peak against average need for
computational power, directly leaving a good reserve of
computational resources idle [5].
Today, Cloud computing is gradually coming to bear in
reality as the most formidable path to business and
organizational growth and has gained rapid interest and
prominence over the past decade. The reason for this rapid
growth cannot be far-fetched. Cloud computing simply
makes very efficient and flexible, the task of scaling
different business services to meet very dynamic business
needs; the shared infrastructure and services they provide
make it a more prudent venture when compared with other
traditional approaches of hosting each of these
infrastructure and services locally.
[22], revealed that 90% of organizations had started
implementing Server Virtualization in some form as a part
of their IT Infrastructure. This opens the mind to the
reality that CC may actually hold the key to formidable
business and organizational growth; and the reason for this
is simply because CC enhances the flexibility and efficiency
associated with scaling different business services to meet
very dynamic business needs [23].
Today, virtualization and cloud computing find its use
in business model simulation and testing, computer aided
designs of business models, and business process
migration, fault tolerance enhancements and backups [13].
6. Prospects for Virtualization and Cloud
Computing
Some of the prospects which to virtualization and CC
have been revealed in researches by [13], [24] and [25] to
include: more favourable policy enactments and
implementations, ubiquity, centralized storage and access-
on-demand, data portability across various cloud
platforms, increased consumer-base for private and public
clouds, less security concerns and more standardization.
An October 2014 survey carried out by Forrester
Consulting on behalf of Infosys revealed by 81% of
companies surveyed that cloud computing is no longer
driven by cost savings anymore, but by agility, simplicity
and a unified view of IT. This result is expected to
increase exponentially within the next few years as more
organizations are expected to turn to the cloud for these
reasons.
7. Challenges of Virtualization and Cloud
Computing
Because Virtualization and Cloud Computing are in
what seems to be a symbiotic relationship, it would be no
gainsaying that challenges faced by one would equally
affect the other. The most prevalent challenge of
virtualization and cloud computing relate to security. A lot
of research has gone into the finding and characterizing
these challenges in recent years. One of such researches
was by [23]. Figure 6 below summarizes the findings of
the research:
Figure 6. Various categories of Cloud Security threats [23]
8. Conclusion
Virtualization and Cloud Computing have come to stay
and have carefully carved a niche for themselves in the
43 Journal of Computer Sciences and Applications
world of business and IT generally. With the many
advantages and possibilities provided by these two
technologies, and the exciting prospects that have been
envisaged, it would be safe to say that these are
technologies that would continue to revolutionize and
transform many areas of human endeavour for years to
come.
References
[1] Ruthfield, S. (1995, September). The Internet's History and
Development From Wartime Tool to the Fish-Cam. Crossroads -
Special issue on networks, 2(1), pp. 2-4.
[2] Dennis, M. A. (2012, March 2). Denial of Service Attack (DoS
Attack). (Encyclopaedia Britannica Online Academic Edition).
Encyclopaedia Britannica. Retrieved January 29, 2014, from
http://www.britannica.com/EBchecked/topic/1055468/denial-of-
service-attack.
[3] Murphy, D. M. (February 2010). War is War? The utility of
cyberspace operations in the contemporary operational
environment. Proceedings of the workshop for the center for
strategic leadership (pp. 1-4). Pennsylvania, USA.: U.S. Army
War College.
[4] Arora, R., & Bajaj, K. S. (2013, March). Highly Effective
Advanced Technology "HEAT" Re-defining Technology for
Hospital Management. International Journal of Management &
Behavioural Sciences, Special Edition, 68-73.
[5] Davies, A. (2004, June). Computational intermediation and the
evolution of computation as a commodity. Applied Economics,
36(11: 1131).
[6] Christopher, S. (1959). Time Sharing in Large Fast Computers.
Proceedings of the International Conference on Information
processing, UNESCO.2.19, pp. 336-341. UNESCO. Retrieved
February 1, 2014.
[7] IBM. (1970). IBM System/360 Operating System: Conversational
Remote Job Entry Concepts and Facilities. International Business
Machine (IBM). North Carolina, USA.: IBM Systems Reference
Library. Retrieved February 1, 2014, from
http://bitsavers.informatik.uni-stuttgart.de/pdf/ibm/360/rje/GC30-
2012-0_CRJE_Concepts_and_Facilities_Jun70.pdf.
[8] Nikiforakis, N., Joosen, W., & Johns, M. (2011). Abusing Locality
in Shared Web Hosting. Proceedings of the Fourth European
Workshop on System Security: Article No. 2. Salzburg, Austria:
Association for Computing Machinery.
[9] Urgaonkar , B., Shenoy, P., & Roscoe, T. (2009, February).
Resource overbooking and application profiling in a shared
Internet hosting platform. ACM Transactions on Internet
Technology (TOIT): Article No. 1 , 9(1).
[10] Bhattiprolu, S., Biederman, E. W., Hallyn, S., & Lezcano, D.
(2008, July). Virtual Servers and Checkpoint/Restart in
Mainstream. ACM SIGOPS Operating Systems Review - Research
and developments in the Linux kernel, 42(5), 104-113.
[11] Buyya, R., & Bubendorfer, K. (2009). Market-Oriented Grid and
Utility Computing. Wiley Publishing.
[12] Skillsoft. (2013). Cloud Computing Basics. United States of
America. Retrieved August 18, 2013.
[13] Ogu, E. C., Omotunde, A. A., Mensah, Y., & Ogbonna, A. C.
(2014). Virtualization and cloud computing: The pathway to
business performance enhancement, sustainability and
productivity. International Journal of Business and Economics
Research, 170-177.
[14] Mell, P., & Grance, T. (September 2011). The NIST Definition of
Cloud Computing. Computer Security Division, Information
Technology Laboratory, National Institute of Standards and
Technology, United States Department of Commerce.
Gaithersburg, MD 20899-8930: National Institute of Standards
and Technology. Retrieved January 28, 2014, from
http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
[15] Gartner AADI Summit. (2009). Cloud Computing as Gartner Sees
it. Gartner's Application Architecture, Development & Integration
Summit.
[16] Strømmen-Bakhtiar, A., & Razavi, A. R. (2011). Cloud
Computing Business Models. Springer Computer
Communications and Networks, 43-60.
[17] Ryan, S., & Jiangchuan, L. (2012). Understanding the Impact of
Denial of Service Attacks on Virtual Machines. Journal of the
IEEE.
[18] Tupakula, U., & Varadharajan, V. (2011). TVDSEC: Trusted
Virtual Domain Security. Institute of Electrical and Electronic
Engineers (IEEE), 57-63.
[19] Pearce, M., Zeadally, S., & Hunt, R. (2013, February).
Virtualization: Issues, Security Threats, and Solutions. Association
for Computing Machinery (ACM) Computing Surveys, Article 17:
1-39.
[20] Gurav, U., & Shaikh, R. (2010). Virtualization A key feature of
cloud computing. Proceedings of the International Conference
and Workshop on Emerging Trends in Technology (ICWET 2010)
(pp. 227-229). Mumbai, Maharashtra, India.: Association for
Computing Machinery.
[21] Sangha, H. (2011, March 9). What is CloudBurst. Retrieved
February 2, 2014, from CLOUDCREO: Virtual Solutions, Real
Benefits: http://blog.cloudcreo.com/?p=1056.
[22] CDW Corporation. (2010, January 11). CDW Server
Virtualization Life Cycle Report (Medium and Large Businesses).
Retrieved from CDW Newsroom:
http://webobjects.cdw.com/webobjects/media/pdf/Newsroom/CD
W-Server-Virtualization-Life-Cycle-Report.pdf.
[23] Nagaraju, K., & Sridaran, R. (2012, September). A Survey on
Security Threats for Cloud Computing. International Journal of
Engineering Research & Technology (IJERT), Volume 1(Issue 7),
1-10.
[24] Morrissey, M. (2014, January 10). The Future of Cloud
Computing - Perspecsys. Retrieved from Cloud Data Security,
Secure Cloud Data Encryption | Perspecsys:
http://perspecsys.com/future-cloud-computing/.
[25] Jones, E. (2013). 2013 Future of Cloud Computing Survey Reveals
Business Driving Cloud Adoption in Everything as a Service Era;
IT Investing Heavily to Catch up and Support Consumers
Graduating from Bring Your Own Device (BYOD) to Bring Your
Own Cloud (BYOC). Palo Alto, California.: North Bridge Venture
Partners. Retrieved May 28, 2014, from
http://www.northbridge.com/2013-future-cloud-computing-
survey-reveals-business-driving-cloud-adoption-everything-
service-era-it.
[26] Chowdhury, K. N., & Boutaba, R. (2009, July). Network
virtualization: state of the art and research challenges. IEEE
Communications Magazine, 47(7), 20-26.
[27] Soundararajan, V., & Anderson, J. M. (2010). The impact of
management operations on the virtualized datacenter. Proceedings
of the 37th annual international symposium on Computer
architecture (pp. 326-337`). New York, NY, USA: ACM.
[28] Miller, K., & Pegah, M. (2007). Virtualization: virtually at the
desktop. Proceedings of the 35th annual ACM SIGUCCS fall
conference (pp. 255-260). New York, NY, USA: ACM.
... Cloud computing refers to the provision of on-demand computing resources, such as networks, servers, storage, applications, and services, accessible over the Internet on a pay-as-you-go basis [1]. It enables the connection of multiple computational, software, and storage resources to form a shared virtual pool, allowing users to procure services that can be rapidly provisioned and released with minimal management effort or service provider interaction [2], [3]. ...
... Cloud computing possesses several crucial characteristics, including on-demand self-service, enabling easy access to required resources without human interaction with each service provider; broad network access, allowing access via standard mechanisms and platforms like mobile phones, tablets, and laptops; resource pooling, where resources from a shared pool are dynamically provided based on demand instead of permanent allocation to users; rapid elasticity, allowing users to scale up or down resources as needed; and measured service, ensuring users only pay for the resources they use [3]. These cloud computing services follow three standardized models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). ...
... As the field of Cloud computing has evolved, several wellknown companies such as SalesForce, Amazon web services (AWS), Google, and Microsoft have introduced their services. Table I highlights the history of Cloud and Edge computing [3], [5], [7]- [11]. ...
Conference Paper
Cloud and Edge computing have transformed the digital landscape, each presenting distinct architectural features. As computing paradigms rapidly evolve, it has become crucial to comprehend their specific architectures. This paper conducts a survey focusing on the architectural dimensions and layers in both Cloud and Edge computing. It comprehensively explores key characteristics, main objectives, underlying concepts, advantages, and performance aspects to bridge the gap between these significant computing paradigms. Furthermore, the research affords insights into diverse architectural models within both the Cloud and Edge computing domains, leading to a comparative analysis. In conclusion, this paper highlights the key points and summarizes the study.
... This evolution reflects the changing needs and capabilities in computing, where cloud computing has emerged as the latest model, offering enhanced flexibility and scalability. Oludele et al. (2014) delve into the evolution of virtualization and cloud computing, tracing their development over time. Their review underscores the significance of virtualization in enabling cloud computing, where multiple guest systems can co-reside on a single host machine. ...
... This convergence has been essential in addressing the increasing volume of digital data and the need for efficient data processing and storage solutions. The review by Oludele et al. (2014) points out the challenges and prospects for future advancements in virtualization and cloud computing. As cloud computing continues to evolve, it faces challenges such as security concerns, data management complexities, and the need for more robust infrastructure. ...
... Padhy and Patra (2012) note that the shift towards cloud computing has been driven by the limitations of previous computing models in handling the growing demands of data-intensive applications. Oludele et al. (2014) also explore the future of cloud computing, suggesting that ongoing advancements in virtualization technology will continue to shape the capabilities and applications of cloud computing. This ongoing development is crucial for meeting the evolving needs of businesses and consumers in a digitally connected world. ...
Article
Full-text available
In an era where data is the new gold, understanding the evolution and future trajectory of data storage technologies is crucial. This paper delves into the transformative journey from traditional storage methods to contemporary paradigms like cloud and edge computing, underpinned by the burgeoning influence of Big Data, IoT, AI, and machine learning. The study's aim is to provide a comprehensive analysis of these technologies, assessing their development, efficacy, and the challenges they face in meeting the escalating demands of data storage. The methodology employed is a meticulous synthesis of literature reviews, case studies, and comparative analyses. This approach facilitates an in-depth exploration of the historical evolution of data storage, the paradigm shifts from cloud to edge computing, and the interplay between technological advancements and user demands. The study also scrutinizes the security concerns inherent in these technologies and identifies strategic directions for future research. Key findings reveal that while cloud computing has revolutionized data storage with its scalability and flexibility, edge computing emerges as a vital solution to latency and bandwidth limitations. The integration of AI and machine learning is identified as a pivotal factor in enhancing the efficiency and intelligence of data storage systems. However, this integration presents unique challenges, necessitating innovative solutions. Conclusively, the study recommends a continued focus on innovation in data storage technologies, emphasizing the development of integrated, secure, and efficient solutions. Future research should particularly explore the potential of AI and machine learning in overcoming current limitations. The paper's scope encompasses a comprehensive overview of the current state and future potential of data storage technologies, making it a valuable resource for researchers, technologists, and policymakers in the field. Keywords: Data Storage Technologies, Cloud Computing, Edge Computing, Big Data, Internet of Things (IoT), Artificial Intelligence (AI).
... Virtualization makes cloud computing environment easier to manage the resources. With the many advantages and possibilities provided by these two technologies, we can say that these technologies will continue to reorganize and modify many fields of human venture for years to come [15]. ...
Conference Paper
Full-text available
Virtualization is a software technique that emulates the operation of the entire computer. Depending on the needs and the powers of the physical computer, several virtual machines can be installed at the same time. The resources of physical computers will be shared between all virtual machines and because of that, virtual machines will be working slower. A virtual machine uses a combination of software and an existing computer to provide additional computer machines, all in one physical device. Cloud computing involves delivering hosted services and cloud applications over the internet and enables users to obtain a shared pool of data from remote physical servers, databases, and computers. Although virtualization and cloud computing are seen as two different techniques, they are interconnected and cannot exist without each other. Virtualization in cloud computing can prevent the IT system from failing and can protect the IT environment from bugs and viruses. In IT infrastructure, cloud computing and virtualization are used together to build a cloud infrastructure. The aim of this study is to define and analyze what virtualization and cloud computing are. Then through a comparison to show how these techniques are related to each other and consequently a conclusion will be drawn.
... The results show that our approach is resistant to assaults and that the overhead imposed is minimalespecially when compared to the benefits offered. Our study yielded a system that enables virtualization-assisted cloud-protection transversely corporeal hosts via the Internet [14], [15]. While Pearson (2009) has written extensively on cloud privacy, cloud security has received little attention in the literature discusses several intriguing security problems, whereas almost comprehensive a faced with significant in the perspective of online storage systems (2009). ...
Article
Cloud technology acceptability and development are being endangered by unresolved cybersecurity issues that impact both the cloud operator and the cloud consumer. In this article, researchers show how virtualized may help secure public cloud by ensuring the integrity of the both guest virtual machines and cloud network equipment.. In specifically, we present the Advanced-Cloud-Protection-System (ACPS), a new construction targeted at ensuring improved security for cloud resources. ACPS may be used on a variety of cloud systems to efficiently while being anonymous to virtualization and cloud users, verify the validity of guest and network resources. Security breaches may be responded to nearby by ACPS, as well as notified to a higher security-management-layer. Two existing open source systems, Eucalyptus and Open ECP, have completely implemented a prototype of our ACPS concept. The prototype is put to the test in terms of efficiency and performance. In specifically, (a) the efficacy of our prototype is shown by testing it against known assaults in the nonfiction; (b) the ACPS prototype's performance is evaluated under various kinds of workload. The results indicate that our approach is resistant to assaults and that the upstairs imposed is minimal when associated to the landscapes available.
... "System administrators manage these servers, which are often characterized as a combined entity that includes the operating system, the architecture, the storage, and indeed the software". If the storage on a conventional server fills up, it must be replaced with a new server [19], [20]. Figure 2 shows the virtual server concept. ...
Article
Cloud computing is one of the most significant milestones in the development of nextgeneration technology and the growing commercial and IT fields. It aids in the resolution of issues such as data loss, data accessibility, and data security. This technology is mostly service-oriented, with an emphasis on cost reduction, hardware reduction, and a pay-as-you-go model. In cloud computing, virtualization refers to the creation of a virtual image of storage devices, servers, or network resources that may be utilized on many computers at the same time. Cloud computing is a very helpful technology that is extensively utilized across the globe. It mostly offers IT services and solutions that are available on demand. Virtualization is important in cloud computing because it allows cloud customers to access virtual storage and compute resources, which is only feasible with virtualization. Cloud computing is a new computer paradigm for businesses that is built on virtualisation, multi-tenancy, and shared infrastructures.
... Recently, the number of newly installed virtual systems has surpassed the number of newly installed physical servers. A recent survey showed that 90% of organizations use virtualization in their IT infrastructures and a further 34% of organizations are using virtual servers to meet the majority of server needs [2], [8]. Virtualization technology has also opened the gate to virtual private network (VPN), software-defined network (SDN), and cloud computing. ...
Article
Nowadays, virtualization is being deployed in many companies and institutions' systems. However, a noticeable security problem of virtualization is the fact that multiple virtual machines are run on one physical host machine called hypervisor. Hypervisors often implement a virtual switch to manage network connections between the internal virtual network and the external physical network. However, an adversary could exploit virtual switch flaws and use them to sabotage the entire virtual network. As a consequence, the attack could make all applications running on virtual machines unavailable. In this paper, we present SVTester, a fuzzing-based testing tool that can automatically identify possible vulnerabilities of a virtual switch that can be exploited for certain types of Denial-of-Service attack. We used an initial version of SVTester to check several hypervisors that implement the virtual switch. The results show that SVTester was able to rediscover DoS weaknesses on an old version of VMware hypervisor and found a novel possible vulnerability in the Oracle VirtualBox hypervisor. Our results also prove the effectiveness and potential of SVTester in evaluating virtual network security.
... It has been first implemented with the Mainframes when different users had to share the same hardware platform to execute their computing tasks. This specific need disappeared with the introduction of personal computers in the 1980s [4]. ...
Article
Full-text available
Teknolojide yaşanan hızlı gelişmelerin her alanda olduğu gibi biyometrik kişi tanıma sistemleri üzerinde de her geçen gün etkisi ve kullanımı artmıştır. Biyometrik kişi tanıma sistemlerinden biri olan yüz tanıma tabanlı sistemler, ek bir donanıma ihtiyaç duymaması, kolay kurulum ve kullanım, hızlı entegrasyonu sayesinde son yıllarda yaygın olarak kullanılmaya başlamıştır. Özellikle bilgisayarlı görme ve bulut bilişim tabanlı uygulamaların yaygınlaşması ile akıllı yüz tanıma sistemleri son yıllarda hayatımızın vazgeçilmez bir parçası haline gelmiştir. Güvenlik, sağlık, eğitim, askeri, alışveriş merkezi ve endüstriyel alanlarda yaygınlaşan bu sistemlerin kullanımı pandemi döneminde daha fazla artış göstermiştir. Yüz tanıma tabanlı sistemler için kurum ve kuruluşlar kendi yazılımlarını yazmak için zaman ve maliyet ayırmak istememektedir. Bu soruna çözüm için büyük bulut bilişim sağlayıcılarının sunduğu hizmetlerden yararlanılabilmektedir. Bu kapsamda makalede, bulut bilişim tabanlı yüz tanıma teknolojisi kullanılarak akıllı duyuru sistemi tasarımı sunulmaktadır. Geçmişte bir duyurunun yapılması zaman alan zor bir iş olarak görülmüştür. Hem baskı mataryelleri sebebiyle maliyetli hemde duyuruda değişiklik olduğunda tüm işlemlerin tekrar yapılması gerektiğinden zaman alan bir iş olduğu düşünülmekteydi. Günümüzde teknolojinin gelişmesiyle tabelalar yerlerini dijital ekranlı ürünlere bıraktı. Geliştirilen bu sistem ile özellikle büyük çapta kurum, kuruluşlar, fabrikalar, üniversiteler, alışveriş merkezleri ve sağlık kurumları için önerilen sistem sayesinde duyuru, uyarı, ikaz, promosyon ve bildirimlerin etkili bir şekilde yapılması ön görülmektedir. Yüz tanıma tabanlı akıllı duyuru sistemi kişi tanıma, cinsiyet belirleme ve yaş tahmini gibi özellikleri %100 oranında tespit ederek, kişiye ait duyuruları öncelik durumlarına göre göstermektedir. Ayrıca, yapılan deneysel çalışmalar sonucunda kişi tanıma ve sistemde duyuruların gösterilmesi ortalama 1,3 saniyede gerçekleştirildiği gözlenmiştir. Duyuru sistemine ait gerçekleştirilen anket çalışmasına göre, sistemi kullananların %85'i faydalı ve kullanışlı olduğunu ifade etmiştir. ABSTRACT The rapid developments in technology have an increasing impact and use on biometric person recognition systems. Facial recognition-based systems, one of the biometric person recognition systems, have been widely used in recent years thanks to their easy implementation, fast integration and simple usage as they do not require any additional equipment. Especially the widespread use of computer vision and cloud-computing based applications, smart face recognition systems have become an indispensable part of our lives in recent years. The use of these systems, which have become widespread in security, health, education, military, shopping mall and industrial areas, has increased more during the pandemic period. Institutions and organizations do not want to allocate time and cost to write their own software for face recognition based systems. The services offered by major cloud computing providers can be used to solve this problem. In this context, the article
Article
Nowadays, with the emergence of IoT technologies, the number of devices connected to the Internet is rapidly increasing. As a result, Network Address Translation (NAT) mechanism is widely used to let multiple devices within a private network make use of a fewer number of public IP addresses. In this research, we focus on Port Address Translation (PAT), an extension of the NAT mechanism that can translate both the IP address and the port number of a TCP/IP packet. An apparent downside of PAT is the fact that when all of the ports are used, no more new outbound connections could be made from the local addresses. In 2018, we introduced Slow-port-exhaustion DoS Attack on a virtual network, a novel type of DoS Attack that exploits some flaws of the TCP protocol and the limitation of the PAT mechanism. In this attack, a compromised internal virtual machine with a low amount of attack bandwidth can occupy the host machine’s ports for a long time and therefore makes other machines on the same virtual network could not connect to the external network. In this paper, we present SPEChecker, a testing tool that can be used to check the feasibility of the Slow-port-exhaustion attack on virtual networks. In the analysis, we also explore a case of a TCP Host that could support this attack. Our testing results also show the potential of SPEChecker in evaluating virtual network security.
Chapter
Full-text available
This chapter is focused on business models for Cloud computing. The authors try to provide a clear picture of various available business models for both Cloud providers and consumers in terms of cost, necessary infrastructures, and expectations. The standard cost model for both service consumers and service ­providers (IaaS, PaaS, and SaaS) has been investigated while keeping in mind the existing interdependence of various levels. Meanwhile the various business models for different layers of the Cloud computing are listed, and their suitability is studied. In this regard, IaaS has been of particular interest since this layer clearly has the least barrier to entry (financing) and therefore presents the greatest opportunity to the SMBs who may be interested in competing in this layer. The chapter can be used as an adequate guideline for businesses who intend to enter the market as Cloud providers (investors, consultants, etc.), are already providers, or are either already Cloud consumers or intend to outsource their IT infrastructure and services using the Cloud.
Article
Full-text available
Cloud Computing provides an efficient and flexible way for services to meet escalating business needs. Cloud-shared infrastructure and associated services make it cost effective alternative to traditional approaches. However, they may also introduce security breaches and privacy issues. As more cloud based applications keep evolving, the associated security threats are also growing. Many research works on cloud security exist in partial forms of either specifically on cloud issues or virtualization-related security issues. In this paper, an attempt has been made to consolidate the various security threats in a classified manner and to illustrate how cloud and virtualization vulnerabilities affect the different cloud service models.
Article
Full-text available
Cloud computing, and the technology of virtualization which drives its foundations, lead the pack of Information Technology (IT) solutions for business that have emerged and kept transforming businesses in recent years. While in acknowledgement of the fact that numerous researches have emerged in recent times on the concepts of virtualization and cloud computing, trying to address issues relating to management, complexity, operability, service delivery, security, amongst others, very little to no effort has been made to study how these technologies impact the dynamic business environment of the 21 st century and the benefits they could hold for businesses of the digital age. In light of this, this paper gives a theoretical review of the business environment as it was before and shortly after the advent of IT, in such a way that novices as well as experts in business and IT would be able to identify with and understand the interactions that have always existed amongst these industries. It further goes on to provide a detailed exposé on cloud computing and virtualization as it affects the business environment of the 21 st century, right from its inception and origins, to survey its history, basic concepts, current trends, modes of deployment and use, as well as the benefits they provide for businesses in our world. It brings in some proven industry perspectives and opinions and presents new insights into what the future has to offer with these twin technologies for both the worlds of business and IT.
Article
Full-text available
The increasing popularity of the World Wide Web has made more and more individuals and companies to identify the need of acquiring a Web presence. The most common way of acquiring such a presence is through Web hosting com-panies and the most popular hosting solution is shared Web hosting. In this paper we investigate the workings of shared Web hosting and we point out the potential lack of session iso-lation between domains hosted on the same physical server. We present two novel server-side attacks against session stor-age which target the logic of a Web application instead of specific logged-in users. Due to the lack of isolation, an at-tacker with a domain under his control can force arbitrary sessions to co-located Web applications as well as inspect and edit the contents of their existing active sessions. Using these techniques, an attacker can circumvent authentication mechanisms, elevate his privileges, steal private information and conduct attacks that would be otherwise impossible. Finally, we test the applicability of our attacks against com-mon open-source software and evaluate their effectiveness in the presence of generic server-side countermeasures.
Article
Full-text available
Recently network virtualization has been pushed forward by its proponents as a long-term solution to the gradual ossification problem faced by the existing Internet and proposed to be an integral part of the next-generation networking paradigm. By allowing multiple heterogeneous network architectures to cohabit on a shared physical substrate, network virtualization provides flexibility, promotes diversity, and promises security and increased manageability. However, many technical issues stand in the way of its successful realization. This article investigates the past and the state of the art in network virtualization along with the future challenges that must be addressed to realize a viable network virtualization environment.
Book
The first single-source reference covering the state of the art in grid and utility computing economy research. This book presents the first integrated, single-source reference on market-oriented grid and utility computing. Divided into four main parts-and with contributions from a panel of experts in the field-it systematically and carefully explores: Foundations-presents the fundamental concepts of market-oriented computing and the issues and challenges in allocating resources in a decentralized computing environment. Business models-covers business models for service providers and brokers supporting different types of distributed applications, as well as business rules-based models for managing virtual organizations and accounting operations and services in grid computing environments. Policies and agreements-introduces policies, agreements, and specifications for the negotiation and establishment of contracts between providers and consumers. It also covers different approaches for resource allocation based on service-level agreements (SLAs) and management of risks associated with SLA violations. Resource allocation and scheduling mechanisms-covers economic models, such as commodity models, reciprocation, auctions, and game theory, and middleware technologies, such as Nimrod/G and Gridbus, for market-oriented grid computing and utility-oriented resource allocation. This book expertly captures the state of the art in the field while also identifying potential research directions and technologies that will facilitate the creation of global commercial grid and utility computing systems. It is an indispensable reference for systems architects, practitioners, developers, new researchers, and graduate students.
Article
Virtualization, which allows multiple Virtual Machines (VMs) to reside on a single physical machine, has become an indispensable technology for today's IT infrastructure. It is known that the overhead for virtualization affects system performance; yet it remains largely unknown whether VMs are more vulnerable to networked Denial of Service (DoS) attacks than conventional physical machines. A clear understanding here is obviously critical to such networked virtualization system as cloud computing platforms. In this paper, we present an initial study on the performance of modern virtualization solutions under DoS attacks. We experiment with the full spectrum of modern virtualization techniques, from paravirtualization, hardware virtualization, to container virtualization, with a comprehensive set of benchmarks. Our results reveal severe vulnerability of modern virtualization: even with relatively light attacks, the file system and memory access performance of VMs degrades at a much higher rate than their non-virtualized counterparts, and this is particularly true for hypervisor-based solutions. We further examine the root causes, with the goal of enhancing the robustness and security of these virtualization systems. Inspired by the findings, we implement a practical modification to the VirtIO drivers in the Linux KVM package, which effectively mitigates the overhead of a DoS attack by up to 40%.
Article
The United States Army War College in partnership with The SecDev Group conducted a workshop examining cyberspace operations from the warfighter's perspective. The workshop was held 26-28 January 2010 at the Collins Center for Strategic Leadership, U.S. Army War College, Carlisle Barracks, Pennsylvania. The U.S. Department of Defense (DoD) defines cyberspace operations as "the employment of cyber capabilities where the primary purpose is to achieve military objectives or effects in or through cyberspace." Cyberspace emerged as a national-level concern through several recent events of geo-strategic significance. Estonian infrastructure was attacked in the spring of 2007, allegedly by Russian hackers. In August 2008, Russia again allegedly conducted cyber attacks, this time in a coordinated and synchronized kinetic and non-kinetic campaign against Georgia. It is plausible that such complex excursions may become the norm in future warfare among nation-states having the capabilities to conduct them. Much has been written about the issues of cyberspace at the national strategic level: lack of attribution and the applicability of the law of armed conflict and of international treaties, and the determination of criminality vice acts of war. But the current body of knowledge does not inform us about how the concept of cyberspace operations impacts and will be adapted by warfighting commanders in the contemporary and future operational environments. The workshop examined this issue and used the Russia-Georgia case study to draw lessons to apply to current and future warfare. The workshop centered on three challenges. The first challenge considered conducting a campaign where cyberspace is contested/constrained and the impact on U.S. warfighting concepts and practices.