Abstract

Cloud computing is one of today's most exciting technology because of its cost-reducing, flexibility, and scalability. With the fast growing of cloud computing technology, Data security becomes more and more important in it. In evaluating whether to move to cloud computing, it is important to compare benefits and also risks of it. Thus, security and other existed issues in the cloud cause cloud clients need more time to think about moving to cloud environments. But Security-related topics is one of the most arguable issues in the cloud computing which caused several enterprises looks to this technology uncertainly and move toward it warily[2]. A Virtualization Security framework is presented which contains two parts: virtual system security and virtualization security management.[1] The paper is devoted to the mechanism of monitoring of virtual machines aimed at guaranteeing increased security to cloud resources. Furthermore, the requirements for this mechanism are enumerated.[3]

Highlights

  • In recent years, cloud computing has emerged as one of the fastest-growing section of the IT industry and more and more businesses have gone to the cloud

  • Cloud computing already leverages virtualization for load balancing via dynamic provisioning and migration of virtual machines among physical resources [3]

  • ● Infrastructure as a Service (IaaS) is where compute, network, and storage are delivered over the network on a pay-asyou-go basis

Read more

Summary

INTRODUCTION

Cloud computing has emerged as one of the fastest-growing section of the IT industry and more and more businesses have gone to the cloud. It changes the delivery model which provides on-demand self-service access to a shared pool of physical and virtual computing resources via broad network access. Cloud computing is primarily altering the expectations for how and when computing, storage and networking resources should be allocated, managed and consumed. Cloud computing is a network-based environment that focuses on sharing computations and resources. Cloud providers use virtualization technologies combined with self-service abilities for computing resources via network infrastructure the Internet. We can observe that many of them work under cloud security Alliance and continue publishing strategy on security [1]

SERVICE LAYERS OF CLOUD COMPUTING
BENEFITS OF THE CLOUD
CLOUD-BASED VIRTUALIZATION
CLOUD SECURITY ISSUES
ATTACKS IN VIRTUALIZATION LEVEL
VM SECURITY AND THREATS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call