A Review Paper on Secure Virtualization for Cloud Computing
Keywords:
ACPS, Cloud-computing, Security, Technology, VirtualizationAbstract
Cloud technology acceptability and development are being endangered by unresolved cybersecurity issues that impact both the cloud operator and the cloud consumer. In this article, researchers show how virtualized may help secure public cloud by ensuring the integrity of the both guest virtual machines and cloud network equipment.. In specifically, we present the Advanced-Cloud-Protection-System (ACPS), a new construction targeted at ensuring improved security for cloud resources. ACPS may be used on a variety of cloud systems to efficiently while being anonymous to virtualization and cloud users, verify the validity of guest and network resources. Security breaches may be responded to nearby by ACPS, as well as notified to a higher security-management-layer. Two existing open source systems, Eucalyptus and Open ECP, have completely implemented a prototype of our ACPS concept. The prototype is put to the test in terms of efficiency and performance. In specifically, (a) the efficacy of our prototype is shown by testing it against known assaults in the nonfiction; (b) the ACPS prototype's performance is evaluated under various kinds of workload. The results indicate that our approach is resistant to assaults and that the upstairs imposed is minimal when associated to the landscapes available.
Downloads
References
M. Saraswat and R. C. Tripathi, “Cloud Computing: Comparison and Analysis of Cloud Service Providers AWs, Microsoft and Google,” in Proceedings of the 2020 9th International Conference on System Modeling and Advancement in Research Trends, SMART 2020, 2020.
M. Saraswat and R. C. Tripathi, “Cloud Computing: Analysis of Top 5 CSPs in SaaS, PaaS and IaaS Platforms,” in Proceedings of the 2020 9th International Conference on System Modeling and Advancement in Research Trends, SMART 2020, 2020.
S. Garg, D. V. Gupta, and R. K. Dwivedi, “Enhanced Active Monitoring Load Balancing algorithm for Virtual Machines in cloud computing,” in Proceedings of the 5th International Conference on System Modeling and Advancement in Research Trends, SMART 2016, 2017.
“Virtualization in Cloud Computing,” J. Inf. Technol. Softw. Eng., 2014.
K. S. K. Devi, G. S, and D. R, “Virtualization in Cloud Computing,” IJARCCE, 2018.
W. Ding, B. Ghansah, and Y. Wu, “Research on the Virtualization technology in Cloud computing environment,” Int. J. Eng. Res. Africa, 2016.
S. Garg, R. K. Dwivedi, and H. Chauhan, “Efficient utilization of virtual machines in cloud computing using Synchronized Throttled Load Balancing,” in Proceedings on 2015 1st International Conference on Next Generation Computing Technologies, NGCT 2015, 2016.
M. García-Valls, T. Cucinotta, and C. Lu, “Challenges in real-time virtualization and predictable cloud computing,” J. Syst. Archit., 2014.
N. Khan, A. Shah, and K. Nusratullah, “Adoption of Virtualization in Cloud Computing,” Int. J. Green Comput., 2016.
D. Agarwal, S. P. Tripathi, and J. B. Singh, “TrFRA: A trust based fuzzy regression analysis,” Int. Rev. Comput. Softw., 2010.
F. Lombardi and R. Di Pietro, “Secure virtualization for cloud computing,” J. Netw. Comput. Appl., 2011. [12] A. P. M and M. T. Sathiyabama, “Virtualization in Cloud Computing,” Int. J. Trend Sci. Res. Dev., 2018.
S. Bharadwaj and A. K. Goyal, “Shaping flexible software development with Agent-Oriented methodology,” in Proceedings of the 5th International Conference on System Modeling and Advancement in Research Trends, SMART 2016, 2017.
A. Oludele, E. C. Ogu, K. ‘Shade, and U. Chinecherem, “On the Evolution of Virtualization and Cloud Computing: A Review,” J. Comput. Sci. Appl., 2014.
R. M. Sharma, “The Impact of Virtualization in Cloud Computing,” Int. J. Recent Dev. Eng. Technol., 2014. [16] P. K. Goswami and G. Goswami, “Machine learning supervised antenna for software defined cognitive radios,” Int. J. Electron., 2021.
H. O. Sharan, R. Kumar, G. Singh, and M. Haroon, “Mesurement of software testability,” Stem Cell, 2011. [18] I. S. Zelenskiy, D. S. Parygin, D. Ather, I. N. Soplyakov,
A. Y. Antyufeev, and E. A. Prigarin, “Software and algorithmic decision support tools for real estate selection and quality assessment,” in Journal of Physics: Conference Series, 2020.
B. K. Sharma, R. P. Agarwal, and R. Singh, “An efficient software watermark by equation reordering and FDOS,” in Advances in Intelligent and Soft Computing, 2012.
A. K. Rai and R. Singh, “Erratum: Performance Analysis of Handover TCP Message in Mobile Wireless Networks,” 2011.
M. Singh, “Virtualization in Cloud Computing- a Study,” in Proceedings - IEEE 2018 International Conference on
Advances in Computing, Communication Control and Networking, ICACCCN 2018, 2018.
S. C. Bansal et al., “Comparison between the QCT and the DEXA scanners in the evaluation of BMD in the lumbar spine,” J. Clin. Diagnostic Res., 2011.
S. Mishra, S. Jain, C. Rai, and N. Gandhi, “Security challenges in semantic web of things,” in Advances in Intelligent Systems and Computing, 2019.
N. Abosata, S. Al-Rubaye, G. Inalhan, and C. Emmanouilidis, “Internet of things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications,” Sensors. 2021.
A. Gupta, B. Gupta, and K. K. Gola, “Blockchain technology for security and privacy issues in internet of things,” Int. J. Sci. Technol. Res., 2020.
R. Jha and A. K. Saini, “A comparative analysis & enhancement of NTRU algorithm for network security and performance improvement,” in Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011, 2011.