Skip to main content

Virtualization as an Engine to Drive Cloud Computing Security

  • Conference paper
High Performance Architecture and Grid Computing (HPAGC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 169))

Abstract

In this paper we have proposed virtualization as an engine to drive cloud based security. Cloud computing is an approach for the delivery of services while virtualization is one possible service that could be delivered. Virtualization enables better security and enables a single user to access multiple physical devices. Large corporations with little downtime tolerance and airtight security requirements may find that virtualization fits them best. Thin clients and software as a service will free users from being tied to their computers, and allow them to access their information anywhere they can find an internet connection. Virtualization is a computing technology that enables a single user to access multiple physical devices. It is a single computer controlling multiple machines, or one operating system utilizing multiple computers to analyze a database.  Virtualization may also be used for running multiple applications on each server rather than just one. It enables us to consolidate our servers and do more with less hardware. With growing pressure to move in this direction, we’re suggesting Virtualization for cloud based security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Leach, J.: The Rise of Service Oriented IT and the Birth of Infrastructure as a Service, March 20, 2008; 2 J. Heiser and M. Nicolett, Accessing the Security Risks of Cloud Computing, Gartner, Inc., Stamford, CT (2008)

    Google Scholar 

  2. Armbrust, M., Fox, A., Griffith, R., et al.: Above the Clouds: A Berkeley View of Cloud Computing. Unversity of California, Berkeley (2009)

    Google Scholar 

  3. Berger, S., Cáceres, R., Goldman, K.A., et al.: vTPM: Virtualizing the Trusted Platform Module. In: Proceedings of the 15th USENIX Security Symposium, Vancouver, B.C (2006)

    Google Scholar 

  4. Scarlata, V., Rozas, C., Wiseman, M., et al.: TPM Virtualization: Building a General Framework. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, pp. 43–56. Vieweg+Teubner, Wiesbaden (2008)

    Chapter  Google Scholar 

  5. Krautheim, F.J., Phatak, D.S.: LoBot: Locator Bot for Securing Cloud Compupting Environments. Submitted 2009 ACM Cloud Computing Security Workshop, Chicago, IL (2009)

    Google Scholar 

  6. Zissis, D., Lekkas, D.: Addressing Cloud Computing Security Issues. Future Generation Computer System (2010) Article in Press, http://dx.doi.org/10.1016/j.future.2010.12.006

  7. Yamaguchi, T., Hashiyama, T., Okuma, S.: A Study On Reconfigurable Computing System Cryptography. In: IEEE International Conference on Cloud Computing, vol. 4, pp. 2965–2968 (2000)

    Google Scholar 

  8. Yuefa, D., Bo, W., Yaqiang, G., Quan, Z.: Data Security Model for Cloud Computing. In: International Workshop on Information Security and Applications, pp. 141–144 (2009)

    Google Scholar 

  9. Sato, H., Kanai, A., Tanimoto, S.: A Cloud Trust Model in a Security Aware Cloud. In: IEEE International symposium on Applications and the Internet, pp. 121–124 (2010)

    Google Scholar 

  10. Kaufman, L.M.: Data Security in the World of Cloud Computing. IEEE Security and Privacy 7(4) (2009)

    Google Scholar 

  11. Amazon Web Services (AWS), http://aws.amazon.com

  12. Shen, Y., Li, K., Yang, L.T.: Advanced Topics in Cloud Computing. Journal of Network and Computer Applications 12, 301–310 (2010)

    Google Scholar 

  13. Subashini, S., Kavitha, V.: A Survey on Security Issues in Service Delivery Models of Cloud Computing. Journal of Network and Computer Applications 34, 1–11 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jyoti, S., Manish, S., Rupali, G. (2011). Virtualization as an Engine to Drive Cloud Computing Security. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds) High Performance Architecture and Grid Computing. HPAGC 2011. Communications in Computer and Information Science, vol 169. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22577-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22577-2_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22576-5

  • Online ISBN: 978-3-642-22577-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics