Securing Virtual Machines using Cloning in Cloud Services

Authors

  • Naveen Kumar Adalagere Nemirajaiah Department of Computer Science & Engineering, Sri Siddhartha Institute of Technology, Sri Siddhartha Academy of Higher Education, Tumakuru, Karnataka, India
  • Channa Krishna Raju Department of Artificial Intelligence & Machine Learning, Sri Siddhartha Institute of Technology, Sri Siddhartha Academy of Higher Education, Tumakuru, Karnataka, India
Volume: 15 | Issue: 2 | Pages: 20770-20775 | April 2025 | https://doi.org/10.48084/etasr.9391

Abstract

Cloud Computing (CC) is now a service available to everyone, where all computing resources are made available as a service over the internet, based on the user's needs. Virtualization is a critical component of cloud services that significantly reduces costs and improves resource utilization by creating Virtual Machines (VMs), which are essentially virtual resources that can serve multiple users simultaneously. VMs are subject to security threats and attacks such as malware, and it is very important to create a secure environment for VMs to run seamlessly. In this novel strategy, we create cloned instances for the VMs so that instead of using the VMs directly to run the application, we allow one of the cloned VMs to run it. If something happens to that cloned VM instance, another cloned VM takes over without interrupting the VM's functionality. This provides security for the VM in the cloud environment.

Keywords:

cloud services, Virtual Machine (VM), security, instance

Downloads

Download data is not yet available.

References

T. Velte, A. Velte, and R. C. Elsenpeter, Cloud Computing, A Practical Approach. New York, NY, USA: McGraw Hill Professional, 2009.

B. Sosinsky, Cloud Computing Bible, 1st ed. Hoboken, NJ, USA: Wiley Publishing, Inc., 2011.

D. S. Linthicum, Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide, 1st ed. Boston, MA, USA: Addison-Wesley Professional, 2009.

S. Gadde, G. S. Rao, V. S. Veesam, M. Yarlagadda, and R. S. M. L. Patibandla, "Secure Data Sharing in Cloud Computing: A Comprehensive Survey of Two-Factor Authentication and Cryptographic Solutions," Ingénierie des Systèmes d’Information, vol. 28, no. 6, pp. 1467–1477, Dec. 2023.

A. N. N. Kumar, M. Mallegowda, A. V. K. Mohan, K. N. Shreenath, and C. K. Raju, "Movement Mode Harmony Search Based Multi-objective Firefly Algorithm Feature Selection for Detecting the Security Threats in Virtual Machine," International Journal of Intelligent Engineering and Systems, vol. 17, no. 1, pp. 159–168, Feb. 2024.

A. N. N. Kumar and N. L. Udayakumar, "Novel approach for Securing Virtual Machines in Cloud Environment," SSAHE Journal of Interdisciplinary Research, vol. 1, no. 1, pp. 60–66, 2020.

N. L. U. Kumar, S. S. R, and M. Siddappa, "Security Issues and Solutions for Virtualization in Cloud Computing Service," International Journal of Engineering Research & Technology, vol. 3, no. 14, Apr. 2018.

G. Peterson, "Don’t Trust. And Verify: A Security Architecture Stack for the Cloud," IEEE Security & Privacy, vol. 8, no. 5, pp. 83–86, Sep. 2010.

H. Takabi, J. B. D. Joshi, and G.-J. Ahn, "Security and Privacy Challenges in Cloud Computing Environments," IEEE Security & Privacy, vol. 8, no. 6, pp. 24–31, Nov. 2010.

N. L. U. Kumar and M. Siddappa, "Ensuring security for virtualization in cloud services," in 2016 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques, Mysuru, India, 2016, pp. 248–251.

J. Szefer, E. Keller, R. B. Lee, and J. Rexford, "Eliminating the hypervisor attack surface for a more secure cloud," in Proceedings of the 18th ACM conference on Computer and communications security, Chicago, IL, USA, 2011, pp. 401–412.

A. Jasti, P. Shah, R. Nagaraj, and R. Pendse, "Security in multi-tenancy cloud," in 44th Annual 2010 IEEE International Carnahan Conference on Security Technology, San Jose, CA, USA, 2010, pp. 35–41.

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in Proceedings of the 16th ACM conference on Computer and communications security, Chicago, IL, USA, 2009, pp. 199–212.

S. Pearson and A. Benameur, "Privacy, Security and Trust Issues Arising from Cloud Computing," in 2010 IEEE Second International Conference on Cloud Computing Technology and Science, Indianapolis, IN, USA, 2010, pp. 693–702.

P. Saripalli and B. Walters, "QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security," in 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, USA, Jul. 2010, pp. 280–288.

S. An, A. Leung, J. B. Hong, T. Eom, and J. S. Park, "Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security," IEEE Access, vol. 10, pp. 75117–75134, 2022.

S. Ahmad, S. Mehfuz, F. Mebarek-Oudina, and J. Beg, "RSM analysis based cloud access security broker: a systematic literature review," Cluster Computing, vol. 25, no. 5, pp. 3733–3763, Oct. 2022.

K. Shanthi and R. Maruthi, "A Comparative Study of Intrusion Detection and Prevention Systems for Cloud Environment," in 2023 4th International Conference on Electronics and Sustainable Communication Systems, Coimbatore, India, 2023, pp. 493–496.

G. Feng, Q. Huang, Z. Deng, H. Zou, and J. Zhang, "Research on cloud security construction of power grid in smart era," in 2022 IEEE 2nd International Conference on Data Science and Computer Application, Dalian, China, 2022, pp. 976–980.

V. A. K. Gorantla, V. Gude, S. K. Sriramulugari, N. Yuvaraj, and P. Yadav, "Utilizing Hybrid Cloud Strategies to Enhance Data Storage and Security in E-Commerce Applications," in 2024 2nd International Conference on Disruptive Technologies, Greater Noida, India, 2024, pp. 494–499.

N. L. U. Kumar and M. Siddappa, "Meeting the challenge of Virtualization impact on Cloud services," International Journal of Computer Science and Information Technologies, vol. 7, no. 1, pp. 457–461, 2016.

Downloads

How to Cite

[1]
Nemirajaiah, N.K.A. and Raju, C.K. 2025. Securing Virtual Machines using Cloning in Cloud Services. Engineering, Technology & Applied Science Research. 15, 2 (Apr. 2025), 20770–20775. DOI:https://doi.org/10.48084/etasr.9391.

Metrics

Abstract Views: 5
PDF Downloads: 3

Metrics Information