Virtualization as an Engine to Drive Cloud Computing Security

被引:0
作者
Jyoti, Snehi [1 ]
Manish, Snehi [2 ]
Rupali, Gill [1 ]
机构
[1] Chitkara Univ, Rajpura, Punjab, India
[2] Infosys Technol Ltd, Chandigarh, India
来源
HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING | 2011年 / 169卷
关键词
Cloud; Infrastructure-as-a-Service (IaaS); Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS); Virtualization;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we have proposed virtualization as an engine to drive cloud based security. Cloud computing is an approach for the delivery of services while virtualization is one possible service that could be delivered. Virtualization enables better security and enables a single user to access multiple physical devices. Large corporations with little downtime tolerance and airtight security requirements may find that virtualization fits them best. Thin clients and software as a service will free users from being tied to their computers. and allow them to access their information anywhere they can find an internet connection. Virtualization is a computing technology that enables a single user to access multiple physical devices. It is a single computer controlling multiple machines, or one operating system utilizing multiple computers to analyze a database. Virtualization may also be used for running multiple applications on each server rather than just one. It enables us to consolidate our servers and do more with less hardware. With growing pressure to move in this direction, we're suggesting Virtualization for cloud based security.
引用
收藏
页码:62 / +
页数:3
相关论文
共 13 条
  • [1] [Anonymous], 2009, CLOUDS BERKELEY VIEW
  • [2] Berger S., 2006, P 15 USENIX SEC S VA
  • [3] Dai YF, 2009, PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, P141
  • [4] Heiser J., 2008, ACCESSING SECURITY R
  • [5] Kaufman L. M., 2009, IEEE SECURITY PRIVAC, V7
  • [6] Krautheim F.J., 2009, 2009 ACM CLOUD UNPUB
  • [7] Leach J, 2008, RISE SERVICE ORIENTE
  • [8] Sato Hiroyuki, 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT), P121, DOI 10.1109/SAINT.2010.13
  • [9] Scarlata Vincent., 2008, TRUSTED COMPUTING, P43, DOI DOI 10.1007/978-3-8348-9452-6_4
  • [10] Shen Y., 2010, J NETW COMPUT APPL, V12, P301