IMPROVING SECURITY FOR VIRTUAL MACHINES IN CLOUD VIRTUALIZATION
Keywords:
Operating System, Servers, Security, Virtualization, Virtual MachineAbstract
Cloud computing is a prominent developing technology that primarily focuses on data storage and the provision of on-demand computer resources for diverse applications. Users may save their data on the cloud and access it quickly and effortlessly. The accessibility of cloud data from any location at any time has drawn many users to this technology; yet, a significant concern in this setting is the privacy of user data. The consolidation of many users' data in a single location raises concerns over data privacy among the users. Virtualization is a method used to provide a virtual environment for the identification and isolation of user data. It enables a user to execute numerous operating systems concurrently on a single computer by generating virtual instances of an operating system, server, or network resource. Virtualization enables the operation of numerous servers on a single system while maintaining isolation between them, since they function on distinct virtual machines.
References
Jingare, P., & Sorte, P. P. (2021). Security Aspects of Virtualization in Cloud Computing. 12(3), 169–172.
Ding, W., Ghansah, B., & Wu, Y. (2016). Research on the Virtualization technology in Cloud computing environment. International Journal of Engineering Research in Africa, 21(6), 191–196. https://doi.org/10.4028/www.scientific.net/JERA.21.191
Chen, L., Xian, M., Liu, J., & Wang, H. (2020). Research on Virtualization Security in Cloud Computing. IOP Conference Series: Materials Science and Engineering, 806(1). https://doi.org/10.1088/1757-899X/806/1/012027
Majumder, A., Roy, S., & Biswas, S. (2015). Data security issues and solutions in cloud computing. Web-Based Services: Concepts, Methodologies, Tools, and Applications, 3(14), 2076–2095. https://doi.org/10.4018/978-1-4666-9466-8.ch091
Rashid, A., & Chaturvedi, A. (2019). Virtualization and its Role in Cloud Computing Environment. International Journal of Computer Sciences and Engineering, 7(4), 1131–1136. https://doi.org/10.26438/ijcse/v7i4.11311136
Kumar, A. (2020). Research Issues in Virtualization in Cloud Computing. International Journal of New Innovations in Engineering and Technology Research, 12(4), 150–159.
Sabahi, F. (2012). Secure Virtualization for Cloud Environment Using Hypervisor-based Technology. International Journal of Machine Learning and Computing, 2(1), 39–45. https://doi.org/10.7763/ijmlc.2012.v2.87
Di Pietro, R., & Lombardi, F. (2018). Virtualization technologies and cloud security: Advantages, issues, and perspectives. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11170 LNCS, 166–185. https://doi.org/10.1007/978-3-030-04834-1_9
Sun, J., Zeng, Y., Shi, G., Li, W., & Li, Z. (2018). The Research for Virtualization Network Security on Cloud Computing. 146(Icaita), 145–148. https://doi.org/10.2991/icaita-18.2018.37
Usha, M. (2014). A Study on Forensic Challenges in Cloud Computing Environments. Journal of NanoScience and
NanoTechnology, 2(3), 291–295. http://indiasciencetech.com/index.php?journal=nanotechnology&page=article&op=view&path[]=82
Kiran Kumar, D., Sarachandrica, T. P., Rajasekhar, B., Jayasankar, P., & Professor, A. (2014). Review on Virtualization for Cloud Computing. International Journal of Advanced Research in Computer and Communication Engineering, 3(8), 2278–1021. www.ijarcce.com
Tiwari, V., Garg, B., & Pradesh, M. (2020). Study on Virtualization Technology and Its Importance in Cloud. 8(2), 966–972.
Oludele, A., C. Ogu, E., ‘Shade, K., & Chinecherem, U. (2014). On the Evolution of Virtualization and Cloud Computing: A Review. Journal of Computer Sciences and Applications, 2(3), 40–43. https://doi.org/10.12691/jcsa-2-3-1
Srivastava, P., & Khan, R. (2018). A Review Paper on Cloud Computing. International Journal of Advanced Research in Computer Science and Software Engineering, 8(6), 17. https://doi.org/10.23956/ijarcsse.v8i6.711
Gowda, T., Vanishree, S., Varshitha, M. S., Yashaswini, K., & Nethravathi, B. (2021). OVERVIEW OF VIRTUALIZATION IN CLOUD COMPUTING. 07, 1841–1846.
Buch, D. (2018). Taxonomy on Cloud Computing Security Issues at Virtualization Layer. International Journal of Advanced Research in Engineering and Technology (IJARET, 9(4), 50–76. http://www.iaeme.com/IJARET/index.asp50http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=9&IType=4http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=9&IType=4
M. Almutairy, N., & H. A. Al-Shqeerat, K. (2019). A Survey on Security Challenges of Virtualization Technology in Cloud Computing. International Journal of Computer Science and Information Technology, 11(03), 95–105.
https://doi.org/10.5121/ijcsit.2019.11308
Kumar, N. L. U., & Siddappa, M. (2016). Meeting the challenge of Virtualization impact on Cloud services. 7(1), 457–461.
Abusaimeh, H. (2020). Virtual machine escape in cloud computing services. International Journal of Advanced Computer Science and Applications, 11(7), 327–331.
https://doi.org/10.14569/IJACSA.2020.0110743.
Jain, R. (n.d.). Virtualization Security in Data Centers and Clouds. 1–12.