SHARE
Facebook X Pinterest WhatsApp

Protection Options for Virtualized Infrastructures in IaaS Cloud

Protection Options for Virtualized Infrastructures in IaaS Cloud The purpose of this paper is to analyze IaaS protection options from the viewpoint of security functionality and the architecture that governs their deployment. Infrastructure as a service (IaaS) is one of the three main cloud service types where the cloud consumer consumes a great variety of […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Jun 24, 2014

Protection Options for Virtualized Infrastructures in IaaS Cloud

The purpose of this paper is to analyze IaaS protection options from the viewpoint of security functionality and the architecture that governs their deployment.


Infrastructure as a service (IaaS) is one of the three main cloud service types where the cloud consumer consumes a great variety of resources such as computing (virtual machines or VMs), virtual network, storage and utility programs (DBMS). Any large-scale offering of this service is feasible only through a virtualized infrastructure at the service provider.

At the minimum, this infrastructure is made up of resources such as virtualized hosts together with associated virtual network and hardware/software for data storage An IaaS’s consumer’s total set of interactions with these resources constitute the set of use cases for IaaS cloud service. These use cases have associated security requirements and these requirements are met by protection options enabled by available security solutions/technologies.

The purpose of this paper is to analyze these protection options from the viewpoint of: (a) security functionality they can provide and (b) the architecture that governs their deployment, so that IaaS consumers can decide on the most appropriate security configuration for their VM instances depending upon the profile of the applications running in them.

The attached zip file includes:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • ProtectionOptionsVIIaaSC.pdf

Recommended for you...

Best Cloud Security Solutions
Aminu Abdullahi
Jun 24, 2022
Strategies for Successful Data Migration
Kashyap Vyas
May 25, 2022
Leveraging AI to Secure CloudOps as Threat Surfaces Grow
ITBE Staff
May 20, 2022
The Emergence of Confidential Computing
Tom Taulli
Apr 20, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.