Enhance Security of Cloud Computing through Fork Virtual Machine

被引:0
|
作者
Elham, Hafida [1 ]
Lebbat, Adil [1 ]
Medromi, Hicham [1 ]
机构
[1] ENSEM, Natl Sch Elect & Mech, Lab Comp Syst & Renewable Energy, Casablanca, Morocco
来源
PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12) | 2012年
关键词
Cloud Computing; Virtualization; Solutions of cloud computing; VM Fork;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is a new trend based on virtualization. It motivates many academic institutions and non-academic to move towards this approach. Our goal is to enhance the security of the cloud computing through virtualization and more precisely by the principle of the fork of the virtual machine. This article describes the proposed solution to achieve this goal and discusses the choice of tools that will be used in the implementation of cloud computing platform to deploy and test the proposed architecture.
引用
收藏
页码:448 / 451
页数:4
相关论文
共 50 条
  • [1] Trusted Model for Virtual Machine Security in Cloud Computing
    Narayana, K. Sathya
    Pasupuleti, Syam Kumar
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 655 - 665
  • [2] A Game Theoretic Approach for Virtual Machine Allocation Security in Cloud Computing
    Ousmane, Sane Bernard
    Mbacke, Babou Cheikh Saliou
    Ibrahima, Niang
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEMS & SECURITY (NISS19), 2019,
  • [3] MONITORING AND ATTESTATION OF VIRTUAL MACHINE SECURITY HEALTH IN CLOUD COMPUTING
    Zhang, Tianwei
    Lee, Ruby B.
    IEEE MICRO, 2016, 36 (05) : 28 - 37
  • [4] Priority Based Virtual Machine Allocation and Scheduling for Security in Cloud Computing
    Radhika, T. V.
    Gouda, Krushna Chandra
    Kumar, S. Sathish
    SMART INTELLIGENT COMPUTING AND APPLICATIONS, VOL 2, 2020, 160 : 617 - 625
  • [5] Efficient Virtual Machine Migration in Cloud Computing
    Desai, Megha R.
    Patel, Hiren B.
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 1015 - 1019
  • [6] DVM: A Big Virtual Machine for Cloud Computing
    Ma, Zhiqiang
    Sheng, Zhonghua
    Gu, Lin
    IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (09) : 2245 - 2258
  • [7] Definition of security metrics for the Cloud Computing and security-aware virtual machine placement algorithms
    Caron, Eddy
    Le, Anh Dung
    Lefray, Arnaud
    Toinard, Christian
    2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 125 - 131
  • [8] Virtual Machine Schedulers for Cloud Computing
    Ettikyala, Kalpana
    Vijayalata, Yellasiri
    Mohan, M. Chandra
    2017 IEEE INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION, INSTRUMENTATION AND CONTROL (ICICIC), 2017,
  • [9] Trust Model to Enhance Security of Cloud Computing
    Mohsenzadeh, Ali
    JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2015, 14 (04): : 315 - 325
  • [10] A Framework to Secure the Virtual Machine Image in Cloud Computing
    Hussein, Raid Khalid
    Alenezi, Ahmed
    Wills, Gary B.
    Walters, Robert J.
    2016 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2016, : 35 - 40