Abstract
In this paper we have proposed virtualization as an engine to drive cloud based security. Cloud computing is an approach for the delivery of services while virtualization is one possible service that could be delivered. Virtualization enables better security and enables a single user to access multiple physical devices. Large corporations with little downtime tolerance and airtight security requirements may find that virtualization fits them best. Thin clients and software as a service will free users from being tied to their computers, and allow them to access their information anywhere they can find an internet connection. Virtualization is a computing technology that enables a single user to access multiple physical devices. It is a single computer controlling multiple machines, or one operating system utilizing multiple computers to analyze a database. Virtualization may also be used for running multiple applications on each server rather than just one. It enables us to consolidate our servers and do more with less hardware. With growing pressure to move in this direction, we’re suggesting Virtualization for cloud based security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Leach, J.: The Rise of Service Oriented IT and the Birth of Infrastructure as a Service, March 20, 2008; 2 J. Heiser and M. Nicolett, Accessing the Security Risks of Cloud Computing, Gartner, Inc., Stamford, CT (2008)
Armbrust, M., Fox, A., Griffith, R., et al.: Above the Clouds: A Berkeley View of Cloud Computing. Unversity of California, Berkeley (2009)
Berger, S., Cáceres, R., Goldman, K.A., et al.: vTPM: Virtualizing the Trusted Platform Module. In: Proceedings of the 15th USENIX Security Symposium, Vancouver, B.C (2006)
Scarlata, V., Rozas, C., Wiseman, M., et al.: TPM Virtualization: Building a General Framework. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, pp. 43–56. Vieweg+Teubner, Wiesbaden (2008)
Krautheim, F.J., Phatak, D.S.: LoBot: Locator Bot for Securing Cloud Compupting Environments. Submitted 2009 ACM Cloud Computing Security Workshop, Chicago, IL (2009)
Zissis, D., Lekkas, D.: Addressing Cloud Computing Security Issues. Future Generation Computer System (2010) Article in Press, http://dx.doi.org/10.1016/j.future.2010.12.006
Yamaguchi, T., Hashiyama, T., Okuma, S.: A Study On Reconfigurable Computing System Cryptography. In: IEEE International Conference on Cloud Computing, vol. 4, pp. 2965–2968 (2000)
Yuefa, D., Bo, W., Yaqiang, G., Quan, Z.: Data Security Model for Cloud Computing. In: International Workshop on Information Security and Applications, pp. 141–144 (2009)
Sato, H., Kanai, A., Tanimoto, S.: A Cloud Trust Model in a Security Aware Cloud. In: IEEE International symposium on Applications and the Internet, pp. 121–124 (2010)
Kaufman, L.M.: Data Security in the World of Cloud Computing. IEEE Security and Privacy 7(4) (2009)
Amazon Web Services (AWS), http://aws.amazon.com
Shen, Y., Li, K., Yang, L.T.: Advanced Topics in Cloud Computing. Journal of Network and Computer Applications 12, 301–310 (2010)
Subashini, S., Kavitha, V.: A Survey on Security Issues in Service Delivery Models of Cloud Computing. Journal of Network and Computer Applications 34, 1–11 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jyoti, S., Manish, S., Rupali, G. (2011). Virtualization as an Engine to Drive Cloud Computing Security. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds) High Performance Architecture and Grid Computing. HPAGC 2011. Communications in Computer and Information Science, vol 169. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22577-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-22577-2_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22576-5
Online ISBN: 978-3-642-22577-2
eBook Packages: Computer ScienceComputer Science (R0)