Skip to main content

Virtualization and Cloud Computing

  • Conference paper
Future Wireless Networks and Information Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 143))

Abstract

Cloud Computing is the fundamental change happening in the field of Information Technology. It is a representation of a movement towards the intensive, large scale specialization. Virtualization is the key component of cloud computing. With the use of virtualization, cloud computing brings about not only convenience and efficiency benefits, but also great challenges in the field of data security and privacy protection. For example, it maybe bind different tenants’ virtual resources to the same physical resource, then the user data will be accessed by other users. To solve this problem, the paper analyses and discusses several ways to improve the safety of cloud computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Luo, Y.: Network I/O Virtualization for Cloud Computing in Plastics. IT Professional 12, 536–541 (2010)

    Article  Google Scholar 

  2. A History of Cloud Computing, http://www.cloudtweaks.com/2011/02/a-history-of-cloud-computing

  3. Google, http://code.google.com/intl/zh-CH/appengine/docs/

  4. Amazon, http://docs.amazonwebservices.com/AWSEC2/lastest/DeveloperGuide/

  5. Microsoft, http://www.microsoft.com/azure/whitepaper.mspx

  6. Peng, L.: Cloud Computing. Publishing House of Electronic Industry, Beijing (2010) (in Chinese)

    Google Scholar 

  7. Peter, M., Timothy, G.: The NIST Definition of Cloud Computing (Draft).NIST Special Publication 800-145, 6–7

    Google Scholar 

  8. Shuai, Z.: Cloud Computing Research and Development Trend. In: 2010 Second International Conference on Future Networks, pp. 93–97. IEEE Computer Society, Piscataway (2010)

    Google Scholar 

  9. Shufen, Z.: Analysis and Research of Cloud Computing System Instance. In: 2010 Second International Conference on Future Networks, pp. 88–92. IEEE Computer Society, Piscataway (2010)

    Google Scholar 

  10. Xue, J.: The research of security mechanism in the cloud computing platform based on virtualization technology, Master’s degree paper, vol. 2 (2010)

    Google Scholar 

  11. History of Virtualization, http://www.infobarrel.com/History_of_Virtualization

  12. Hanfei, D.: Formal Discussion on Relationship between Virtualization and Cloud Computing. In: The 11th International Conference on Parallel and Distributed Computing Applications and Technologies, pp. 448–453. IEEE Computer Society, Piscataway (2010)

    Google Scholar 

  13. Feng, D.: Study on Cloud Computing Security. Journal of Software 1, 71–83 (2011) (in Chinese)

    Article  Google Scholar 

  14. Communication World Web, http://www.cww.net.cn/cwwservice/

  15. Sriya, S., Pradheep, E., Andrea, A., Miron, L.: Deploying virtual machines as sandboxes for the grid. In: Second Workshop on Real, Large Distributed Systems, pp. 7–12 (2005)

    Google Scholar 

  16. Raj, H., Nathuji, R., Singh, A., England, P.: Resource management for isolation enhanced cloud services. In: Sion, R. (ed.) Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009, pp. 77–84. Association for Computing Machinery, New York (2009)

    Google Scholar 

  17. Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Sion, R. (ed.) Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009, pp. 91–96. Association for Computing Machinery, New York (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuping Xing .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Xing, Y., Zhan, Y. (2012). Virtualization and Cloud Computing. In: Zhang, Y. (eds) Future Wireless Networks and Information Systems. Lecture Notes in Electrical Engineering, vol 143. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27323-0_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27323-0_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27322-3

  • Online ISBN: 978-3-642-27323-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics