IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Designing Efficient Security Services Infrastructure for Virtualization Oriented Architectures

Designing Efficient Security Services Infrastructure for Virtualization Oriented Architectures
View Sample PDF
Author(s): Dr. Eng. Syed Naqvi (Birmingham City University, UK)
Copyright: 2011
Pages: 23
Source title: Pervasive Information Security and Privacy Developments: Trends and Advancements
Source Author(s)/Editor(s): Hamid Nemati (The University of North Carolina at Greensboro, USA)
DOI: 10.4018/978-1-61692-000-5.ch011

Purchase

View Designing Efficient Security Services Infrastructure for Virtualization Oriented Architectures on the publisher's website for pricing and purchasing information.

Abstract

Virtualization technologies are emerging as a promising solution for managing the rapidly growing complexities of modern distributed ICT infrastructures. However, a mainstream operational concern for these virtualization oriented architectures is to provide efficient security services. Establishment of in-depth security services and trust relationships are the most desirable features for the effective functioning of these systems. This chapter presents a security architecture to address the comprehensive security needs of today’s virtualization oriented architectures. The concept of virtualization of security services is introduced so as to have absolute freedom to choose the underlying security mechanisms. This concept of virtualization of security services is realized through distributed virtual engines that enable unification of security service calls according to requirements and not according to the underlying technologies. A configurable mechanism for the invocation of security services is proposed to address the security needs of different kinds of users. This approach permits the evolution of efficient security infrastructure with minimal impact on the resource management functionalities. In this way, users and resource providers can configure the security services according to their requirements and satisfaction level. The resulting extensible set of security services include both core security services and contemporary security services required for the modern virtualization oriented infrastructures.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom