CFP last date
20 December 2024
Reseach Article

Integration of Virtualization & Cloud Computing

Published on May 2012 by Archana Singh Parmar, Monika Sharma
National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
Foundation of Computer Science USA
RTMC - Number 11
May 2012
Authors: Archana Singh Parmar, Monika Sharma
e56d1a47-6e63-4b7a-90d9-e48d9d9af28a

Archana Singh Parmar, Monika Sharma . Integration of Virtualization & Cloud Computing. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 11 (May 2012), 36-40.

@article{
author = { Archana Singh Parmar, Monika Sharma },
title = { Integration of Virtualization & Cloud Computing },
journal = { National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 },
issue_date = { May 2012 },
volume = { RTMC },
number = { 11 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 36-40 },
numpages = 5,
url = { /proceedings/rtmc/number11/6705-1103/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%A Archana Singh Parmar
%A Monika Sharma
%T Integration of Virtualization & Cloud Computing
%J National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%@ 0975-8887
%V RTMC
%N 11
%P 36-40
%D 2012
%I International Journal of Computer Applications
Abstract

Virtualization and Cloud computing are simply platforms and operational models respectively. . Virtualization is fast emerging as a game-changing technology in the enterprise computing space. What was once viewed as a technology useful for testing and development is going mainstream and is affecting the entire data-center ecosystem.Virtual machines by nature are designed to dynamically adjust to workloads .For security to really work in those kinds of environments, the controls need to be just as dynamic. The key technology is virtualization. In addition to some amazing cost savings and goodness for the environment, virtualizations ability to separate the OS and application from the hardware give it ideal properties to best deliver these on-demand cloud services. " With the increased penetration of virtualization and cloud computing, the technology is well out of the concept stage and into fruition. One thing to bear in mind, however, is that although virtualization and cloud are often tied together, they are not necessarily fused. In this paper we have discussed all aspect of virtualization and cloud computing and the dependence of both on each other. and Why does virtualization matter when building or selecting cloud services

References
  1. A. Baliga, X. Chen, and L. Iftode. Paladin: Automated detection and containment of rootkit attacks. Department of Computer Science, Rutgers University, April., 2006.
  2. Bryan D. Payne and Martim Carbone and Wenke Lee. Secure and flexible monitoring of virtual machines. Computer Security Applications Conference, Annual, 0:385–397, 2007.
  3. P. M. Chen and B. D. Noble. When virtual is better than real. In HOTOS ’01: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, page 133, Washington, DC, USA, 2001. IEEE Computer Society.
  4. G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: enabling intrusion analysis through virtual-machine logging and replay. SIGOPS Oper. Syst. Rev., 36(SI):211–224, 2002.
  5. T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In Proceedings of the 2003 Network and Distributed System Symposium, 2003.
  6. A. Joshi, S. T. King, G. W. Dunlap, and P. M. Chen. Detecting past and present intrusions through vulnerability-specific predicates. In SOSP ’05: Proceedings of the twentieth ACM symposium on Operating systems principles, pages 91–104, New York, NY, USA, 2005. ACM.
  7. L. Litty and D. Lie. Manitou: a layer-below approach to fighting malware. In ASID ’06: Proceedings of the 1st workshop on Architectural and system support for improving software dependability, pages 6–11, New York, NY, USA, 2006. ACM.
  8. G. F. Lyon. NMAP Network Scanning. Nmap Project, 2009.
  9. B. D. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An architecture for secure active monitoring using virtualization. Security and Privacy, IEEE Symposium on, 0:233–247, 2008.
  10. N. L. Petroni, Jr., T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In SSYM’04: Proceedings of the 13th conference on USENIX Security Symposium, pages 13–13, Berkeley, CA, USA, 2004. USENIX Association.
  11. N. L. Petroni, Jr. and M. Hicks. Automated detection of persistent kernel control-flow attacks. In CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security, pages 103–115, New York, NY, USA, 2007. ACM.
Index Terms

Computer Science
Information Sciences

Keywords

Virtualization cloud security data center server