2018)), have been proposed and are an active area of
research by the industry.
These enclaves shift the trust from the cloud
operator to the hardware manufacturer and use
cryptographic algorithms to attest to the user that the
code and data that he provided is being executed in a
secure enclave that cannot be probed by external
agents without being noticed. As disadvantages they
usually bring significant performance overheads and
are nonetheless susceptible to some attacks
(Weichbrodt et al., 2016).
5 CONCLUSIONS AND FUTURE
WORK
Virtualization is at an advanced stage now, however
there is still much to do in order to make this
technology safer, faster, easier and better.
In this paper, we surveyed virtualization, with a
main emphasis on its past and current challenges as
well as solutions, to help in the improvement of this
technology, giving a view of what already exists,
what is being currently done in the field and what
can be done in the future.
Virtualization will continue to increase in
security, performance and popularity in the nearby
future. The future work in the area will surely fall
under one of the previous mentioned topics: VM
protection against failure (either by improving the
already existing tools or by creating new ones); VM
performance (mainly through the improvement of
the existing virtualization techniques); cloud
virtualization and data security (either by improving
the existing tools or by implementing new ones).
REFERENCES
Aboulnaga, A., n.d. Virtualization and Databases: State of
the Art and Research Challenges 45.
Adams, K., Agesen, O., 2006. A comparison of software
and hardware techniques for x86 virtualization. ACM
SIGARCH Comput. Archit. News 34, 2–13.
AMDSEV - https://github.com/AMDESE/AMDSEV
(accessed 26/04/2018)
Bagdi, H., Kugve, R., Gopalan, K., 2017a. HyperFresh:
Live Refresh of Hypervisors Using Nested
Virtualization, in: Proceedings of the 8th Asia-Pacific
Workshop on Systems. ACM, p. 18.
Bagdi, H., Kugve, R., Gopalan, K., 2017b. HyperFresh:
Live Refresh of Hypervisors Using Nested
Virtualization, in: Proceedings of the 8th Asia-Pacific
Workshop on Systems. ACM, p. 18.
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T.,
Ho, A., Neugebauer, R., Pratt, I., Warfield, A., 2003.
Xen and the art of virtualization, in: ACM SIGOPS
Operating Systems Review. ACM, pp. 164–177.
Bazm, M.-M., Lacoste, M., Südholt, M., Menaud, J.-M.,
2017. Side Channels in the Cloud: Isolation
Challenges, Attacks, and Countermeasures.
Berghmans, O., 2010. Nesting virtual machines in
virtualization test frameworks (PhD Thesis). Master’s
thesis, University of Antwerp.
Claycomb, W.R., Nicoll, A., 2012. Insider threats to cloud
computing: Directions for new research challenges, in:
Computer Software and Applications Conference
(COMPSAC), 2012 IEEE 36th Annual. IEEE, pp.
387–394.
Colsani, G., Giusti, G., Pássera, P., Protti, D., (2008)
‘Virtualization Technology Introduction’.
Costan, V., Devadas, S., 2016. Intel SGX Explained.
IACR Cryptol. EPrint Arch. 2016, 86.
Cully, B., Lefebvre, G., Meyer, D., Feeley, M.,
Hutchinson, N., Warfield, A., 2008. Remus: High
availability via asynchronous virtual machine
replication, in: Proceedings of the 5th USENIX
Symposium on Networked Systems Design and
Implementation. San Francisco, pp. 161–174.
Greamo, C., Ghosh, A., 2011. Sandboxing and
Virtualization: Modern Tools for Combating Malware.
IEEE Secur. Priv. 9, 79–82. https://doi.org/10.1109/
MSP.2011.36
Heiser, G., 2008. The role of virtualization in embedded
systems, in: Proceedings of the 1st Workshop on
Isolation and Integration in Embedded Systems. ACM,
pp. 11–16.
Herbst, N.R., Kounev, S., Reussner, R., n.d. Elasticity in
Cloud Computing: What It Is, and What It Is Not 6.
Jin, X., Chen, H., Wang, X., Wang, Z., Wen, X., Luo, Y.,
Li, X., 2009. A simple cache partitioning approach in
a virtualized environment, in: Parallel and Distributed
Processing with Applications, 2009 IEEE
International Symposium On. IEEE, pp. 519–524.
Joe, H., Jeong, H., Yoon, Y., Kim, H., Han, S., Jin, H.W.,
2012. Full virtualizing micro hypervisor for spacecraft
flight computer, in: 2012 IEEE/AIAA 31st Digital
Avionics Systems Conference (DASC). Presented at
the 2012 IEEE/AIAA 31st Digital Avionics Systems
Conference (DASC), pp. 6C5-1-6C5-9. https://doi.org/
10.1109/DASC.2012.6382393
Lacoste, A.W.M., Debar, H., n.d. KungFuVisor: Enabling
Hypervisor Self-Defense.
Lee, C., Kim, S.-W., Yoo, C., 2016. VADI: GPU
virtualization for an automotive platform. IEEE Trans.
Ind. Inform. 12, 277–290.
Lombardi, F., Di Pietro, R., 2011. Secure virtualization for
cloud computing. J. Netw. Comput. Appl., Advanced
Topics in Cloud Computing 34, 1113–1122.
https://doi.org/10.1016/j.jnca.2010.06.008
Michael, D. D. I., Harper, R. A., Liguori, A. N., 2013.
Nested virtualization performance in a computer
system.
Nakajima, J., Mallick, A.K., 2007. Hybrid-virtualization—
enhanced virtualization for Linux, in: Proceedings of