Skip navigation

Technology perspective: Is green IT a threat to IT security?

Technology perspective: Is green IT a threat to IT security?

Frangiskatos, Dimitrios, Ghassemian, Mona and Gan, Diane ORCID: 0000-0002-0920-7572 (2010) Technology perspective: Is green IT a threat to IT security? In: Information Security and Digital Forensics. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (41). Springer, Berlin, Heidelberg, New York, pp. 147-154. ISBN 978-3-642-11529-5 ISSN 1867-8211 (doi:https://doi.org/10.1007/978-3-642-11530-1)

[img] PDF
09_95.pdf - Published Version
Restricted to Repository staff only

Download (2MB)

Abstract

Industries are pushed by the regulations to reduce the CO2 footprint of their production lines. According to the latest statistics 3% of the CO2 footprint is generated by the IT industry. Currently a high percentage of the information being accessed by the users is produced and managed centrally. With the growth of data generation by users, e.g. social networking and YouTube websites, the storing and manging of the data will demand more energy on the networks.

One of the solutions to reduce the energy consumption in ICT is introduced by virtualisation technology. While virtualisation can help to reduce the energy consumption, it has introduced other complexities to the environment, such a scalability, resource management, security and management.

This paper focuses on the security issues created by the use of virtualisation technology which is being promoted to make computing Green. We also aim to highlight the system vulnerabilities which are a direct result of pushing computing to become greener by using virtualisation technology. We discuss the research challenges and directions needed to be further investigated in this field.

Item Type: Conference Proceedings
Title of Proceedings: Information Security and Digital Forensics
Additional Information: [1] First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers [2] Copyright ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
Uncontrolled Keywords: Virtualisation Technology; IT Security
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
T Technology > T Technology (General)
Pre-2014 Departments: School of Computing & Mathematical Sciences
School of Computing & Mathematical Sciences > Department of Smart Systems Technologies
Related URLs:
Last Modified: 14 Oct 2016 09:17
URI: http://gala.gre.ac.uk/id/eprint/6593

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics