Virtualization: a key feature of cloud computing
暂无分享,去创建一个
Over the past few years, researchers have been striving for a Utility Computing Model. Cloud computing allows delivering information technology on demand. Cloud Computing service providers provides resources by means of virtualization. Applying these techniques however goes along with handling over ultimate control of data to a third party. This paper discusses several issues in virtualization security, summery of various solutions, risk prevention in VMM (virtual machine monitor). Here an attempt is made to perform the analysis of various issues pertaining to virtualization and security.
[1] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[2] Leon Gommans,et al. Seamless live migration of virtual machines over the MAN/WAN , 2006, Future Gener. Comput. Syst..
[3] Andrew Warfield,et al. Xen and the art of virtualization , 2003, SOSP '03.
[4] Ole Agesen,et al. A comparison of software and hardware techniques for x86 virtualization , 2006, ASPLOS XII.
[5] Yaozu Dong,et al. Extending Xen* with Intel Virtualization Technology , 2006 .