Increase the security of the cloud virtualization by using virtual machine behavior monitor

被引:0
作者
Moghadam, Seyed Sadegh Mousavi [1 ]
Kashanian, Hooman [1 ]
Behname, Javad [1 ]
机构
[1] Islamic Azad Univ, Ferdows Branch, Dept Comp Engn, Tehran, South Khorasan, Iran
来源
INTERNATIONAL JOURNAL OF ADVANCED BIOTECHNOLOGY AND RESEARCH | 2016年 / 7卷
关键词
cloud computing; virtualization; virtual machine;
D O I
暂无
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Now, the cloud computing due to costs reduction, flexibility and high expandability; is one of the most attractive technologies. Now, protecting in the Internet cloud functions is the big challenge, in this regard, information security and privacy of users is essential and critical in the cloud space. The purpose of this study was to introduce virtualization as one of the most effective ways to increase security in cloud computing. In this technology, is taken a objective copy of the operating system, firmware or interfaces software and applications, and as a pre-built is placed in a physical computer or part of a service provider. Using this technology, we can increase the security of cloud computing to maintain the integrity of the guest virtual machines and cloud components infrastructure. The most important virtualization capabilities are allocated automatically resources in required time and space to users. Virtualization allowing the cloud providers to run a variety of operating systems, which require the cloud users and gives possibility of concurrent operating systems and other applications on a physical machine. With the development of computer and human interdependence to the digital world, the researchers are always looking for ways to speed up and improve their customer service, which today the cloud computing is realized this.
引用
收藏
页码:681 / 690
页数:10
相关论文
共 50 条
[31]   Network Virtualization System for Security in Cloud Computing [J].
Ashalatha, R. ;
Agarkhed, Jayashree ;
Patil, Siddarama .
PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2017), 2017, :346-350
[32]   Design, Implementation and Verification of Cloud Architecture for Monitoring a Virtual Machine's Security Health [J].
Zhang, Tianwei ;
Lee, Ruby B. .
IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (06) :799-815
[33]   A Desirable Strategy for Resource Allocation using Virtual Machine in Cloud [J].
Abinaya, B. ;
Suganthi, J. ;
Kumar, R. G. Suresh ;
Nalini, T. .
INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (05) :25-30
[34]   An Efficient On-Demand Virtual Machine Migration in Cloud Using Common Deployment Model [J].
Saravanakumar, C. ;
Priscilla, R. ;
Prabha, B. ;
Kavitha, A. ;
Prakash, M. ;
Arun, C. .
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 42 (01) :245-256
[35]   An Optimal Disk Allocation in Cloud Virtual Machine Deployment [J].
Huang, Li-Shing ;
Chen, Hsin-Hung ;
Chen, Jian-Bo ;
Pao, Tsang-Long .
PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS FOR SCIENCE AND ENGINEERING (IEEE-ICAMSE 2016), 2016, :558-561
[36]   Security Assessment Framework for Multi-tenant Cloud with Nested Virtualization [J].
Mjihil, Oussama ;
Kim, Dong Seong ;
Haqiq, Abdelkrim .
JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2016, 11 (02) :87-96
[37]   Security Assessment Framework for Multi-tenant Cloud with Nested Virtualization [J].
Mjihil, Oussama ;
Kim, Dong Seong ;
Haqiq, Abdelkrim .
JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2016, 11 (05) :283-292
[38]   Predicting Strategic Behavior Using Game Theory for Secure Virtual Machine Allocation in Cloud [J].
Narwal, Priti ;
Singh, Shailendra Narayan ;
Kumar, Deepak .
NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 2, 2018, 4 :83-92
[39]   Design of Virtual Machine Monitor for Embedded Systems [J].
Son, Sung Hoon .
INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 :1629-1632
[40]   Priority Based Virtual Machine Allocation and Scheduling for Security in Cloud Computing [J].
Radhika, T. V. ;
Gouda, Krushna Chandra ;
Kumar, S. Sathish .
SMART INTELLIGENT COMPUTING AND APPLICATIONS, VOL 2, 2020, 160 :617-625