Implementation levels of virtualization and security issues in cloud computing
-
https://doi.org/10.14419/ijet.v7i2.33.15474
Received date: July 13, 2018
Accepted date: July 13, 2018
Published date: June 8, 2018
-
Virtualization, Cloud Computing, Architecture, Security, Hypervisor. -
Abstract
Cloud is the buzz word in the industry. The initiation of virtualization technology in the infrastructure domain gives us the options to procure the benefits of the cloud deployments. Virtualization is a fast-growing infrastructure in the IT industry. Technology providers and user communities have introduced a new set of terms to describe the technologies and their features for virtualization. Virtualization characterizes the logical vision of data representation. The authority to compute in virtualized environment, storing the data at dissimilar geographies and diverse computing resources. Virtualization technology allows the creation of the virtual versions of hardware, networking resources, Operating systems and storage devices. It supports multiple OS run on single physical machine called host machine and multiple guest application run on single server called host server. Hypervisors assistance in virtualization of hardware. That is, the software interrelates with the physical system, providing virtualized environment to maintain multiple operating system running parallel using one physical server. This paper provides the information about the implementation levels of virtualization, the benefits and security problems of Virtualization in virtualized hardware environment.
-
References
- Ahmed Albugmi, Madini o.Alassafi, Robert Walters, Gary Wills “Data security in cloud computing” IEEE, Future Generation Communication Technologies (FGCT), October 2016.
- Yubin Xia, Yutao Liu, Haibing Guan, Yunji Chen, Tianshi Chen, Binyu Zang, and Haibo Chen“Secure Outsourcing of Virtual Appliance” IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 5, NO. 3, JULY-SEPTEMBER 2017.
- Andrew R .Riddle, Soon M.Chung, “A Survey on the Security of Hypervisors in Cloud Computing”, IEEE, ICDCSW, 2015, Pages: 100 – 104.
- Arpit Gupta, Vaishali chourey“Cloud computing: Security threats & control strategy using tri-mechanism”IEEE, ICCICCT, 2014.
- Chunxiao Li, Anand Raghunathan, Niraj K.Jha “A Trusted Virtual Machine in an Untrusted Management Environment”, IEEE Transactions on Services Computing (Volume: 5, Issue: 4, Pages: 472 - 483), 2012.
- T.Swathi, K.Srikanth, S. Raghunath Reddy, “VIRTUALIZATION IN CLOUD COMPUTING”, IEEE, Internal Journal of Computer Science and Mobile Computing, IJCSMC, Vol.3, Issue.5 May 2014.
- Harshitha.K.Raj, “A Survey on Cloud Computing”, International Journal of advanced Research in Computer Science and Software Engineering,Vol.4,Issue 7,July 2014.
- Lata Ingle, Ganesh K.Pakle, “A survey on IDS and counter-measure excerption approach for detecting VM exposures in cloud environment-based on AODV protocol”, IEEE, ICICT, Vol.3, page1-5.
- D.Kiran Kumar, T.P.Sarachandrica, B.Rajasekhar, P.Jayasankar, “Review on Virtualization for Cloud Computing”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 8, August 2014.
- Gabriel CephasObasuyi, Arif Sari, “Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment”, Int. J. Communications, Network and System Sciences, 2015, 8, 260-273.
- Sonam Srivastava,S.P Singh, “A Survey On Virtualization and Hypervisor-based Technology in Cloud Computing Environment”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET),Volume 5 ,Issue 2,February 2016.
- Prof. D. G. Vyawahare, Rohit B. Bende, Dheeraj N. Bhajipale, Ravindra D. Bharsakle , Amol G. Salve, “A Survey on Security Challenges and Solutions in Cloud Computing”, International Journal of Innovative Research in Computer and Communication Engineering,Vol. 4, Issue 3,March 2016.
- Qiao Yan, F. Richard Yu, Senior Member, IEEE, Qingxiang Gong, and Jianqiang Li “Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 18, and NO. 1, 2016.
- Preeti Sirohi, Amit Agarwal, “Cloud computing data storage security framework relating to data integrity, privacy and trust”, International Conference on Next Generation Computing Technologies (NGCT), IEEE, January,2016.
- K C Gouda, Dines Dwivedi, Anurag Patro, Nagaraj Bhat, “Migration Management in Cloud Computing”, International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Issue 9- June 2014.
-
Downloads
-
How to Cite
Banushri, A., & R. A. Karthika, D. (2018). Implementation levels of virtualization and security issues in cloud computing. International Journal of Engineering and Technology, 7(2.33), 678-682. https://doi.org/10.14419/ijet.v7i2.33.15474
