The Role of Virtualization Techniques to Overcome the Challenges in Cloud Computing

oud computing is a new trend which increase application ability in terms of functionality, resource management and collaborative aspect in term of distributed as well as centralized computing environment. Cloud computing system produce new disputes because of system clusters and high volume data generated by these systems. Storage virtualization makes stockpiling a ware. This makes for some intriguing courses for organizations to lessen their expenses. The central part of cloud computing is virtualization which enables industry or academic IT resources through on-demand allocation dynamically. The main importance in cloud computing is virtualization, which perform user requests on different logical machines in term of their execution in a predefined manner. Cloud computing is unquestionably conceivable without virtualization, however requires more work and time to really pull it off; by utilizing virtualization, it would be fundamentally getting a great deal of the work accomplished for nothing. The resources can be multiple networks in a client server environment having storage as well as applications. The main purpose of this research is how to increase resource management with virtualization which will improve the performance of cloud computing resource allocation its challenges and proposed new approach which will helpful to optimize the performance in sharing network infrastructure.

[1]  Karen A. Scarfone,et al.  Guide to Security for Full Virtualization Technologies , 2011 .

[2]  Werner Dubitzky,et al.  Large-Scale Computing Techniques for Complex System Simulations , 2011 .

[3]  Yunchuan Sun,et al.  Constructing the Web of Events from raw data in the Web of Things , 2014, Mob. Inf. Syst..

[4]  Zhifeng Xiao,et al.  Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[5]  Zahir Tari,et al.  Security and Privacy in Cloud Computing , 2014, IEEE Cloud Computing.

[6]  Prashant J. Shenoy,et al.  Agile dynamic provisioning of multi-tier Internet applications , 2008, TAAS.

[7]  Jin B. Hong,et al.  Availability Modeling and Analysis of a Virtualized System , 2009, 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing.

[8]  Christoph Meinel,et al.  Infrastructure as a service security: Challenges and solutions , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).

[9]  Sami Tabbane,et al.  State of the Art and Research Challenges of new services architecture technologies: Virtualization, SOA and Cloud Computing , 2010 .

[10]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[11]  V. R. Wadhankar,et al.  A Survey Paper on security Enhancement for Privacy Preservation in Cloud Computing by Anonymous Request Access , 2015 .

[12]  Baijian Yang,et al.  Securing Virtualized Datacenters , 2014, ArXiv.

[13]  Deep Medhi,et al.  A hierarchical model to evaluate quality of experience of online services hosted by cloud computing , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.

[14]  Tushar Sharma,et al.  Virtualization Techniques InCloud Computing , 2016 .