Implementation levels of virtualization and security issues in cloud computing
-
2018-06-08 https://doi.org/10.14419/ijet.v7i2.33.15474 -
Virtualization, Cloud Computing, Architecture, Security, Hypervisor. -
Abstract
Cloud is the buzz word in the industry. The initiation of virtualization technology in the infrastructure domain gives us the options to procure the benefits of the cloud deployments. Virtualization is a fast-growing infrastructure in the IT industry. Technology providers and user communities have introduced a new set of terms to describe the technologies and their features for virtualization. Virtualization characterizes the logical vision of data representation. The authority to compute in virtualized environment, storing the data at dissimilar geographies and diverse computing resources. Virtualization technology allows the creation of the virtual versions of hardware, networking resources, Operating systems and storage devices. It supports multiple OS run on single physical machine called host machine and multiple guest application run on single server called host server. Hypervisors assistance in virtualization of hardware. That is, the software interrelates with the physical system, providing virtualized environment to maintain multiple operating system running parallel using one physical server. This paper provides the information about the implementation levels of virtualization, the benefits and security problems of Virtualization in virtualized hardware environment.
Â
Â
 -
References
[1] Ahmed Albugmi, Madini o.Alassafi, Robert Walters, Gary Wills “Data security in cloud computing†IEEE, Future Generation Communication Technologies (FGCT), October 2016.
[2] Yubin Xia, Yutao Liu, Haibing Guan, Yunji Chen, Tianshi Chen, Binyu Zang, and Haibo Chen“Secure Outsourcing of Virtual Appliance†IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 5, NO. 3, JULY-SEPTEMBER 2017.
[3] Andrew R .Riddle, Soon M.Chung, “A Survey on the Security of Hypervisors in Cloud Computingâ€, IEEE, ICDCSW, 2015, Pages: 100 – 104.
[4] Arpit Gupta, Vaishali chourey“Cloud computing: Security threats & control strategy using tri-mechanismâ€IEEE, ICCICCT, 2014.
[5] Chunxiao Li, Anand Raghunathan, Niraj K.Jha “A Trusted Virtual Machine in an Untrusted Management Environmentâ€, IEEE Transactions on Services Computing (Volume: 5, Issue: 4, Pages: 472 - 483), 2012.
[6] T.Swathi, K.Srikanth, S. Raghunath Reddy, “VIRTUALIZATION IN CLOUD COMPUTINGâ€, IEEE, Internal Journal of Computer Science and Mobile Computing, IJCSMC, Vol.3, Issue.5 May 2014.
[7] Harshitha.K.Raj, “A Survey on Cloud Computingâ€, International Journal of advanced Research in Computer Science and Software Engineering,Vol.4,Issue 7,July 2014.
[8] Lata Ingle, Ganesh K.Pakle, “A survey on IDS and counter-measure excerption approach for detecting VM exposures in cloud environment-based on AODV protocolâ€, IEEE, ICICT, Vol.3, page1-5.
[9] D.Kiran Kumar, T.P.Sarachandrica, B.Rajasekhar, P.Jayasankar, “Review on Virtualization for Cloud Computingâ€, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 8, August 2014.
[10] Gabriel CephasObasuyi, Arif Sari, “Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environmentâ€, Int. J. Communications, Network and System Sciences, 2015, 8, 260-273.
[11] Sonam Srivastava,S.P Singh, “A Survey On Virtualization and Hypervisor-based Technology in Cloud Computing Environmentâ€, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET),Volume 5 ,Issue 2,February 2016.
[12] Prof. D. G. Vyawahare, Rohit B. Bende, Dheeraj N. Bhajipale, Ravindra D. Bharsakle , Amol G. Salve, “A Survey on Security Challenges and Solutions in Cloud Computingâ€, International Journal of Innovative Research in Computer and Communication Engineering,Vol. 4, Issue 3,March 2016.
[13] Qiao Yan, F. Richard Yu, Senior Member, IEEE, Qingxiang Gong, and Jianqiang Li “Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challengesâ€, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 18, and NO. 1, 2016.
[14] Preeti Sirohi, Amit Agarwal, “Cloud computing data storage security framework relating to data integrity, privacy and trustâ€, International Conference on Next Generation Computing Technologies (NGCT), IEEE, January,2016.
[15] K C Gouda, Dines Dwivedi, Anurag Patro, Nagaraj Bhat, “Migration Management in Cloud Computingâ€, International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Issue 9- June 2014.
-
Downloads
-
How to Cite
Banushri, A., & R. A. Karthika, D. (2018). Implementation levels of virtualization and security issues in cloud computing. International Journal of Engineering & Technology, 7(2.33), 678-682. https://doi.org/10.14419/ijet.v7i2.33.15474Received date: 2018-07-13
Accepted date: 2018-07-13
Published date: 2018-06-08