Virtualization techniques: Challenges and opportunities

Lyes Bouali, Emad A. Abd-Elrahman, Hossam Afifi, Samia Bouzefrane, Mehammed Daoui

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The gap between the deployment costs for the new services, apps and hosting machines with the expected revenue forces the operators to think in the virtualization concept although the heterogeneity in virtualization techniques solutions. While this virtualization architecture came with different challenges like instances isolation in the hardware or software layers, it anticipated many opportunities for fast deployment and resources management. This position paper lists the main challenges starting from tenants’ isolation and hardware trusting for virtualization layer till the software and network mapping issues for virtual instances communication under the softwarization techniques. Moreover, it sums up the directions for this research point in terms of the vision of software and hardware.

Original languageEnglish
Title of host publicationMobile, Secure, and Programmable Networking - 2nd International Conference, MSPN 2016, Revised Selected Papers
EditorsEric Renault, Selma Boumerdassi, Samia Bouzefrane
PublisherSpringer Verlag
Pages49-62
Number of pages14
ISBN (Print)9783319504629
DOIs
Publication statusPublished - 1 Jan 2016
Externally publishedYes
Event2nd International Conference on Mobile, Secure, and Programmable Networking, MSPN 2016 - Paris, France
Duration: 1 Jun 20163 Jun 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10026 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Conference on Mobile, Secure, and Programmable Networking, MSPN 2016
Country/TerritoryFrance
CityParis
Period1/06/163/06/16

Keywords

  • Containers
  • NFV
  • SDN
  • TPM
  • VM
  • Virtualization

Fingerprint

Dive into the research topics of 'Virtualization techniques: Challenges and opportunities'. Together they form a unique fingerprint.

Cite this