Securing Virtual Machines using Cloning in Cloud Services
Received: 23 October 2024 | Revised: 26 November 2024, 19 December 2024, and 26 December 2024 | Accepted: 29 December 2024 | Online: 3 April 2025
Corresponding author: Naveen Kumar Adalagere Nemirajaiah
Abstract
Cloud Computing (CC) is now a service available to everyone, where all computing resources are made available as a service over the internet, based on the user's needs. Virtualization is a critical component of cloud services that significantly reduces costs and improves resource utilization by creating Virtual Machines (VMs), which are essentially virtual resources that can serve multiple users simultaneously. VMs are subject to security threats and attacks such as malware, and it is very important to create a secure environment for VMs to run seamlessly. In this novel strategy, we create cloned instances for the VMs so that instead of using the VMs directly to run the application, we allow one of the cloned VMs to run it. If something happens to that cloned VM instance, another cloned VM takes over without interrupting the VM's functionality. This provides security for the VM in the cloud environment.
Keywords:
cloud services, Virtual Machine (VM), security, instanceDownloads
References
T. Velte, A. Velte, and R. C. Elsenpeter, Cloud Computing, A Practical Approach. New York, NY, USA: McGraw Hill Professional, 2009.
B. Sosinsky, Cloud Computing Bible, 1st ed. Hoboken, NJ, USA: Wiley Publishing, Inc., 2011.
D. S. Linthicum, Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide, 1st ed. Boston, MA, USA: Addison-Wesley Professional, 2009.
S. Gadde, G. S. Rao, V. S. Veesam, M. Yarlagadda, and R. S. M. L. Patibandla, "Secure Data Sharing in Cloud Computing: A Comprehensive Survey of Two-Factor Authentication and Cryptographic Solutions," Ingénierie des Systèmes d’Information, vol. 28, no. 6, pp. 1467–1477, Dec. 2023.
A. N. N. Kumar, M. Mallegowda, A. V. K. Mohan, K. N. Shreenath, and C. K. Raju, "Movement Mode Harmony Search Based Multi-objective Firefly Algorithm Feature Selection for Detecting the Security Threats in Virtual Machine," International Journal of Intelligent Engineering and Systems, vol. 17, no. 1, pp. 159–168, Feb. 2024.
A. N. N. Kumar and N. L. Udayakumar, "Novel approach for Securing Virtual Machines in Cloud Environment," SSAHE Journal of Interdisciplinary Research, vol. 1, no. 1, pp. 60–66, 2020.
N. L. U. Kumar, S. S. R, and M. Siddappa, "Security Issues and Solutions for Virtualization in Cloud Computing Service," International Journal of Engineering Research & Technology, vol. 3, no. 14, Apr. 2018.
G. Peterson, "Don’t Trust. And Verify: A Security Architecture Stack for the Cloud," IEEE Security & Privacy, vol. 8, no. 5, pp. 83–86, Sep. 2010.
H. Takabi, J. B. D. Joshi, and G.-J. Ahn, "Security and Privacy Challenges in Cloud Computing Environments," IEEE Security & Privacy, vol. 8, no. 6, pp. 24–31, Nov. 2010.
N. L. U. Kumar and M. Siddappa, "Ensuring security for virtualization in cloud services," in 2016 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques, Mysuru, India, 2016, pp. 248–251.
J. Szefer, E. Keller, R. B. Lee, and J. Rexford, "Eliminating the hypervisor attack surface for a more secure cloud," in Proceedings of the 18th ACM conference on Computer and communications security, Chicago, IL, USA, 2011, pp. 401–412.
A. Jasti, P. Shah, R. Nagaraj, and R. Pendse, "Security in multi-tenancy cloud," in 44th Annual 2010 IEEE International Carnahan Conference on Security Technology, San Jose, CA, USA, 2010, pp. 35–41.
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in Proceedings of the 16th ACM conference on Computer and communications security, Chicago, IL, USA, 2009, pp. 199–212.
S. Pearson and A. Benameur, "Privacy, Security and Trust Issues Arising from Cloud Computing," in 2010 IEEE Second International Conference on Cloud Computing Technology and Science, Indianapolis, IN, USA, 2010, pp. 693–702.
P. Saripalli and B. Walters, "QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security," in 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, USA, Jul. 2010, pp. 280–288.
S. An, A. Leung, J. B. Hong, T. Eom, and J. S. Park, "Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security," IEEE Access, vol. 10, pp. 75117–75134, 2022.
S. Ahmad, S. Mehfuz, F. Mebarek-Oudina, and J. Beg, "RSM analysis based cloud access security broker: a systematic literature review," Cluster Computing, vol. 25, no. 5, pp. 3733–3763, Oct. 2022.
K. Shanthi and R. Maruthi, "A Comparative Study of Intrusion Detection and Prevention Systems for Cloud Environment," in 2023 4th International Conference on Electronics and Sustainable Communication Systems, Coimbatore, India, 2023, pp. 493–496.
G. Feng, Q. Huang, Z. Deng, H. Zou, and J. Zhang, "Research on cloud security construction of power grid in smart era," in 2022 IEEE 2nd International Conference on Data Science and Computer Application, Dalian, China, 2022, pp. 976–980.
V. A. K. Gorantla, V. Gude, S. K. Sriramulugari, N. Yuvaraj, and P. Yadav, "Utilizing Hybrid Cloud Strategies to Enhance Data Storage and Security in E-Commerce Applications," in 2024 2nd International Conference on Disruptive Technologies, Greater Noida, India, 2024, pp. 494–499.
N. L. U. Kumar and M. Siddappa, "Meeting the challenge of Virtualization impact on Cloud services," International Journal of Computer Science and Information Technologies, vol. 7, no. 1, pp. 457–461, 2016.
Downloads
How to Cite
License
Copyright (c) 2025 Naveen Kumar Adalagere Nemirajaiah, Channa Krishna Raju

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.