Increase the security of the cloud virtualization by using virtual machine behavior monitor

被引:0
作者
Moghadam, Seyed Sadegh Mousavi [1 ]
Kashanian, Hooman [1 ]
Behname, Javad [1 ]
机构
[1] Islamic Azad Univ, Ferdows Branch, Dept Comp Engn, Tehran, South Khorasan, Iran
来源
INTERNATIONAL JOURNAL OF ADVANCED BIOTECHNOLOGY AND RESEARCH | 2016年 / 7卷
关键词
cloud computing; virtualization; virtual machine;
D O I
暂无
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Now, the cloud computing due to costs reduction, flexibility and high expandability; is one of the most attractive technologies. Now, protecting in the Internet cloud functions is the big challenge, in this regard, information security and privacy of users is essential and critical in the cloud space. The purpose of this study was to introduce virtualization as one of the most effective ways to increase security in cloud computing. In this technology, is taken a objective copy of the operating system, firmware or interfaces software and applications, and as a pre-built is placed in a physical computer or part of a service provider. Using this technology, we can increase the security of cloud computing to maintain the integrity of the guest virtual machines and cloud components infrastructure. The most important virtualization capabilities are allocated automatically resources in required time and space to users. Virtualization allowing the cloud providers to run a variety of operating systems, which require the cloud users and gives possibility of concurrent operating systems and other applications on a physical machine. With the development of computer and human interdependence to the digital world, the researchers are always looking for ways to speed up and improve their customer service, which today the cloud computing is realized this.
引用
收藏
页码:681 / 690
页数:10
相关论文
共 50 条
[41]   Dynamic Resource Provisioning in Cloud Computing Environment using Priority based Virtual Machine's [J].
Girase, Sagar D. ;
Sohani, Mayank ;
Patil, Suraj .
2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, :1777-1782
[42]   Optimal Scheduling of Computational Task in Cloud using Virtual Machine Tree [J].
Achar, Raghavendra ;
Thilagam, P. Santhi ;
Shwetha, D. ;
Pooja, H. ;
Roshni ;
Andrea .
2012 THIRD INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2012, :143-146
[43]   Research on a security mechanism for cloud computing based on virtualization [J].
Ye Du ;
Ruhui Zhang ;
Meihong Li .
Telecommunication Systems, 2013, 53 :19-24
[44]   Security as a Service Model for Virtualization Vulnerabilities in Cloud Computing [J].
Paikrao, Rahul L. ;
Patil, Varsha H. .
2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, :559-562
[45]   A Study on the Virtualization Security Management in the Cloud Computing Environment [J].
Cheong, Il-Ahn ;
Lee, Seulgi ;
Son, Kyungho .
INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 :2035-2039
[46]   Research on a security mechanism for cloud computing based on virtualization [J].
Du, Ye ;
Zhang, Ruhui ;
Li, Meihong .
TELECOMMUNICATION SYSTEMS, 2013, 53 (01) :19-24
[47]   On data and virtualization security risks and solutions of cloud computing [J].
Luo, Xiangyang ;
Yang, Lin ;
Hao, Dai ;
Liu, Fenlin ;
Wang, Daoshun .
Journal of Networks, 2014, 9 (03) :571-581
[48]   Definition of security metrics for the Cloud Computing and security-aware virtual machine placement algorithms [J].
Caron, Eddy ;
Le, Anh Dung ;
Lefray, Arnaud ;
Toinard, Christian .
2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, :125-131
[49]   Cross Virtual Machine Security: A Survey [J].
Zirari, Khalid ;
Idrissi, Hamza Kamal ;
Bensaid, Hicham ;
En-Nouaary, Abdeslam ;
El-Yahyaoui, Ahmed .
DIGITAL TECHNOLOGIES AND APPLICATIONS, ICDTA 2022, VOL 1, 2022, 454 :190-199
[50]   Security Enhancement in Healthcare Cloud using Machine Learning [J].
Marwan, Mbarek ;
Kartit, Ali ;
Ouahmane, Hassan .
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 :388-397