Increase the security of the cloud virtualization by using virtual machine behavior monitor

被引:0
作者
Moghadam, Seyed Sadegh Mousavi [1 ]
Kashanian, Hooman [1 ]
Behname, Javad [1 ]
机构
[1] Islamic Azad Univ, Ferdows Branch, Dept Comp Engn, Tehran, South Khorasan, Iran
来源
INTERNATIONAL JOURNAL OF ADVANCED BIOTECHNOLOGY AND RESEARCH | 2016年 / 7卷
关键词
cloud computing; virtualization; virtual machine;
D O I
暂无
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Now, the cloud computing due to costs reduction, flexibility and high expandability; is one of the most attractive technologies. Now, protecting in the Internet cloud functions is the big challenge, in this regard, information security and privacy of users is essential and critical in the cloud space. The purpose of this study was to introduce virtualization as one of the most effective ways to increase security in cloud computing. In this technology, is taken a objective copy of the operating system, firmware or interfaces software and applications, and as a pre-built is placed in a physical computer or part of a service provider. Using this technology, we can increase the security of cloud computing to maintain the integrity of the guest virtual machines and cloud components infrastructure. The most important virtualization capabilities are allocated automatically resources in required time and space to users. Virtualization allowing the cloud providers to run a variety of operating systems, which require the cloud users and gives possibility of concurrent operating systems and other applications on a physical machine. With the development of computer and human interdependence to the digital world, the researchers are always looking for ways to speed up and improve their customer service, which today the cloud computing is realized this.
引用
收藏
页码:681 / 690
页数:10
相关论文
共 50 条
[21]   A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud Computing [J].
Elmrabet, Zakaria ;
Elghazi, Hamid ;
Sadiki, Tayeb ;
Elghazi, Hassan .
ADVANCES IN UBIQUITOUS NETWORKING, 2016, 366 :105-116
[22]   Cloud Computing Security in Multi-processor Virtualization Environment [J].
Xi, Chen .
INFORMATION COMPUTING AND APPLICATIONS, ICICA 2013, PT I, 2013, 391 :427-435
[23]   CyberGuarder: A virtualization security assurance architecture for green cloud computing [J].
Li, Jianxin ;
Li, Bo ;
Wo, Tianyu ;
Hu, Chunming ;
Huai, Jinpeng ;
Liu, Lu ;
Lam, K. P. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (02) :379-390
[24]   Detecting similarities in virtual machine behavior for cloud monitoring using smoothed histograms [J].
Canali, Claudia ;
Lancellotti, Riccardo .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2014, 74 (08) :2757-2769
[25]   Towards virtual machine introspection based security framework for cloud [J].
Borisaniya, Bhavesh ;
Patel, Dhiren .
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 44 (02)
[26]   A Security-awareness Virtual Machine Placement Scheme in the Cloud [J].
Yu, Si ;
Gui, Xiaolin ;
Tian, Feng ;
Yang, Pan ;
Zhao, Jianqiang .
2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, :1078-1083
[27]   Security Issues Due to Vulnerabilities in the Virtual Machine of Cloud Computing [J].
Bhagat, Swapnil P. ;
Patil, Vikram S. ;
Meshram, Bandu B. .
INTELLIGENT COMPUTING AND COMMUNICATION, ICICC 2019, 2020, 1034 :625-634
[28]   Towards virtual machine introspection based security framework for cloud [J].
Bhavesh Borisaniya ;
Dhiren Patel .
Sādhanā, 2019, 44
[29]   Virtualization as an Engine to Drive Cloud Computing Security [J].
Jyoti, Snehi ;
Manish, Snehi ;
Rupali, Gill .
HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING, 2011, 169 :62-+
[30]   Virtualization Security Issues and Mitigations in Cloud Computing [J].
Krishna, S. Rama ;
Rani, B. Padmaja .
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 :117-128