2. VIRTUALIZATION OF RESOURCES
• Anything required for the execution of a program is called a resource. The
processor, memory, displays, mice, keyboards, disk storage, printers, and
networks are all examples of resources. The primary functions of an operating
system are management of resources and virtualization of resources. Part of the
management is implicit in the virtualization.
4. • Cloud computing services classification
• Application
• Operating system
• Hypervisor
• Hardware and software primitives
Software as a service
Platform as a service
Infrastructure as a service
Data storage as a service
5. VIRTUALIZATION SECURITY
• virtualization technology showed its potential within a cloud ecosystem by
bringing different benefits such as cost-efficiency, increased uptime, improved
disaster recovery, and application isolation. virtualization also threatened the
cloud computing by opening new attack vectors as the following ones:
• Hypervisor
• Resource allocation
• Pivoting
• Migration attacks
6. HARDWARE RESOURCES
• CPU Virtualization: involves a single CPU acting as if it were multiple separate CPUs. The most common reason for doing
this is to run multiple different operating systems on one machine. CPU virtualization emphasizes performance and runs directly
on the available CPUs whenever possible.
• GPU Virtualization
• Network Virtualization:Network virtualization refers to the management and monitoring of an entire computer
network as a single administrative entity from a single software-based administrator’s console. Network virtualization
also may include storage virtualization, which involves managing all storage as a single resource. Network virtualization
is designed to allow network optimization of data transfer rates, flexibility, scalability, reliability and security.
7. OS RESOURCES
Operating system resources are the physical or virtual components of limited availability within a computer system. Every device
connected to a computer system is a resource. Every internal system component is a resource. Virtual system resources include
files, network connections and memory areas.
• Kernel Integrity
• Privilege Separation
8. APPLICATION RESOURCES
Secure Data Storage
Encrypted data manipulation
Data integrity
Data redundancy cancellation
User Data Isolation
Process isolation
Selective decryption techniques