Skip to main content

Improving Cloud Security through Virtualization

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 204))

Abstract

Cloud Computing is accessing Services through Internet based on pay per usage model. Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) are available in Cloud. Cloud based products will eliminate the need to install and manage client rich applications. Cloud Service providers are helping companies to reduce the high cost infrastructure installation and maintenance cost. The customer is charged only for the resources consumed like utility based computing. Virtualization is a technique to implement cloud computing resources such as platform, application, storage, and network. The beauty of virtualization solutions is that you can run multiple virtual machines (VM) simultaneously on a single machine. This paper provides details about cloud computing issues, how virtualization techniques can be used to overcome those issues.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud Computing and Grid Computing 360-Degree Compared. In: Grid Computing Environments Workshop, GCE 2008, November 12-16 (2008)

    Google Scholar 

  2. Harauz, J., Kaufman, L.M., Potter, B.: Data Security in the World of Cloud Computing. IEEE Security and Privacy 7(4), 61–64 (2009)

    Article  Google Scholar 

  3. Loganayagi, B., Sujatha, S.: Creating virtual platform for cloud computing. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), December 28-29, pp. 1–4 (2010), doi:10.1109/ICCIC.2010.5705744

    Google Scholar 

  4. Loganayagi, B., Sujatha, S.: Cloud Computing in Stax Platform. In: IEEE International Conference on Computer Communication and Electrical Technology (IEEE- ICCCET 2011), March 18-19, pp. 1–5 (2011)

    Google Scholar 

  5. Zhao, S., Chen, K., Zheng, W.: The Application of Virtual Machines on System Security. In: 2009 Fourth ChinaGrid Annual Conference, Chinagrid, pp. 222–229 (2009)

    Google Scholar 

  6. Zhang, L.-J., Zhou, Q.: CCOA: Cloud Computing Open Architecture. In: IEEE International Conference on Web Services, ICWS 2009, July 6-10, pp. 607–616 (2009)

    Google Scholar 

  7. Viega, J.: Cloud Computing and the Common Man. Computer 42(8), 106–108 (2009)

    Article  Google Scholar 

  8. Cunsolo, V.D., Distefano, S., Puliafito, A., Scarpa, M.: Volunteer Computing and Desktop Cloud: The Cloud@Home Paradigm. In: Eighth IEEE International Symposium on Network Computing and Applications, pp. 134–139 (2009)

    Google Scholar 

  9. Mei, L., Chan, W.K., Tse, T.H.: A Tale of Clouds: Paradigm Comparisons and Some Thoughts on Research Issues. In: IEEE Asia-Pacific Services Computing Conference, pp. 464–469 (2008)

    Google Scholar 

  10. Reese, G.: Cloud Application Architectures. O’Reilly, Sebastopol (2009)

    Google Scholar 

  11. Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy. O’Reilly, Sebastopol (2009)

    Google Scholar 

  12. Ritinghouse, J.W., Ransome, J.F.: Cloud Computing: Implementation Management and Security. CRC Press, Boca Raton (2010)

    Google Scholar 

  13. Virtualbox Information, http://www.virtualbox.org/wiki/Documentation

  14. Cloud General Information, http://en.wikipedia.org/wiki/Cloud_computing

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Loganayagi, B., Sujatha, S. (2011). Improving Cloud Security through Virtualization. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds) Trends in Computer Science, Engineering and Information Technology. CCSEIT 2011. Communications in Computer and Information Science, vol 204. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24043-0_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24043-0_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24042-3

  • Online ISBN: 978-3-642-24043-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics