Cloud computing is one of today's most exciting technologies, because it can reduce the cost and complexity of applications, and it is flexible and scalable. These benefits changed cloud computing from a dreamy idea into one of the fastest growing technologies today. Actually, virtualization technology is built on virtualization technology which is an old technology and has had security issues that must be addressed before cloud technology is affected by them. In addition, the virtualization technology has limit security capabilities in order to secure wide area environment such as the cloud. Therefore, the development of a robust security system requires changes in traditional virtualization architecture. This paper proposes new security architecture in a hypervisor-based virtualization technology in order to secure the cloud environment.
Cloud computing is one of today's most exciting technologies because of its capacity to lessen costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing sectors of the IT industry. But on the other hand, IT organizations have expressed concerns about critical issues such as security that accompany the widespread implementation of cloud computing. Security, in particular, is one of the most debated issues in the field of cloud computing and several enterprises look at cloud computing warily due to projected security risks. Also, there are two other issues. They are the reliability and availability of the cloud which are as important as security. Although each of those three issues is associated with usage of the cloud, they will have different degrees of importance. Examination of the benefits and risks of cloud computing is necessary for a full evaluation of the viability of cloud computing. This article reviews issues and challenges of cloud computing's reliability, availability and security (RAS). Beginning with a brief discussion on virtualization technology, a key element of cloud infrastructure, it examines issues facing in cloud RAS fields. Then, it addresses the challenges and problems in cloud computing RAS. It also examines intrusion detection methods and outlines counter measures to improve cloud RAS.
A vehicular ad-hoc network (VANET) is a new type of ad hoc network that is becoming even more popular than the original ad hoc concept. The structure of a VANET is built on mobile connectivity between car drivers and automobile equipment that informs the drivers about road status or other necessary travel information. The VANET is capable of improving the safety of the roads and reducing traffic congestion. However, VANETs face security issues typical of all networks. For example, some users may try to break into a VANET to use the service without paying for it, or for malicious purposes.In this paper, I discuss the security issues available in the VANET. In addition, I prioritize issues and introduce several families of attacks that have migrated from the original ad hoc networks to VANET. These are serious threats that are capable of crashing the VANET. Index Terms-VANET, adhoc, security.Farzad Sabahi received Bachelor of Science and Master of Science degrees in Computer Engineering from Azad University in 2003 and 2007 respectively, specializing in the computer architecture. His research interests include computer architecture, distributed systems, cloud computing, hypervisor-based security and wireless network security. He is a lecturer in the Department of Electrical and Computer Engineering at the Azad University, Zanjan, Iran. He has published several papers in distributed systems, cloud computing, and wireless network security. He has been an invited reviewer for different international conferences. He has been member of The Institute of Electrical and Electronics Engineers (IEEE) since 2006.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.