Abstract
Cloud Computing is the fundamental change happening in the field of Information Technology. It is a representation of a movement towards the intensive, large scale specialization. Virtualization is the key component of cloud computing. With the use of virtualization, cloud computing brings about not only convenience and efficiency benefits, but also great challenges in the field of data security and privacy protection. For example, it maybe bind different tenants’ virtual resources to the same physical resource, then the user data will be accessed by other users. To solve this problem, the paper analyses and discusses several ways to improve the safety of cloud computing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Luo, Y.: Network I/O Virtualization for Cloud Computing in Plastics. IT Professional 12, 536–541 (2010)
A History of Cloud Computing, http://www.cloudtweaks.com/2011/02/a-history-of-cloud-computing
Amazon, http://docs.amazonwebservices.com/AWSEC2/lastest/DeveloperGuide/
Peng, L.: Cloud Computing. Publishing House of Electronic Industry, Beijing (2010) (in Chinese)
Peter, M., Timothy, G.: The NIST Definition of Cloud Computing (Draft).NIST Special Publication 800-145, 6–7
Shuai, Z.: Cloud Computing Research and Development Trend. In: 2010 Second International Conference on Future Networks, pp. 93–97. IEEE Computer Society, Piscataway (2010)
Shufen, Z.: Analysis and Research of Cloud Computing System Instance. In: 2010 Second International Conference on Future Networks, pp. 88–92. IEEE Computer Society, Piscataway (2010)
Xue, J.: The research of security mechanism in the cloud computing platform based on virtualization technology, Master’s degree paper, vol. 2 (2010)
History of Virtualization, http://www.infobarrel.com/History_of_Virtualization
Hanfei, D.: Formal Discussion on Relationship between Virtualization and Cloud Computing. In: The 11th International Conference on Parallel and Distributed Computing Applications and Technologies, pp. 448–453. IEEE Computer Society, Piscataway (2010)
Feng, D.: Study on Cloud Computing Security. Journal of Software 1, 71–83 (2011) (in Chinese)
Communication World Web, http://www.cww.net.cn/cwwservice/
Sriya, S., Pradheep, E., Andrea, A., Miron, L.: Deploying virtual machines as sandboxes for the grid. In: Second Workshop on Real, Large Distributed Systems, pp. 7–12 (2005)
Raj, H., Nathuji, R., Singh, A., England, P.: Resource management for isolation enhanced cloud services. In: Sion, R. (ed.) Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009, pp. 77–84. Association for Computing Machinery, New York (2009)
Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Sion, R. (ed.) Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009, pp. 91–96. Association for Computing Machinery, New York (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this paper
Cite this paper
Xing, Y., Zhan, Y. (2012). Virtualization and Cloud Computing. In: Zhang, Y. (eds) Future Wireless Networks and Information Systems. Lecture Notes in Electrical Engineering, vol 143. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27323-0_39
Download citation
DOI: https://doi.org/10.1007/978-3-642-27323-0_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27322-3
Online ISBN: 978-3-642-27323-0
eBook Packages: EngineeringEngineering (R0)