2011
DOI: 10.1007/978-3-642-18129-0_87
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Security by System-Level Virtualization in Cloud Computing Environments

Abstract: Abstract. Many trends are opening up the era of cloud computing, which will reshape the IT industry. Virtualization techniques have become an indispensable ingredient for almost all cloud computing system. By the virtual environments, cloud provider is able to run varieties of operating systems as needed by each cloud user. Virtualization can improve reliability, security, and availability of applications by using consolidation, isolation, and fault tolerance. In addition, it is possible to balance the workloa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 5 publications
0
1
0
Order By: Relevance
“…The biggest concern of using clouds is their security, which has become a very important and critical issue [32], since both the software and its data are located on remote servers, and they may stop working or get crashed with no error display or even be attacked by hackers. In September 2009, according to a behavioral study by International Data Corporation (IDC), those basic challenges of cloud computing identified by organizations were determined, five of which are shown in Figure 4 [33].…”
Section: System Evaluation and Discussionmentioning
confidence: 99%
“…The biggest concern of using clouds is their security, which has become a very important and critical issue [32], since both the software and its data are located on remote servers, and they may stop working or get crashed with no error display or even be attacked by hackers. In September 2009, according to a behavioral study by International Data Corporation (IDC), those basic challenges of cloud computing identified by organizations were determined, five of which are shown in Figure 4 [33].…”
Section: System Evaluation and Discussionmentioning
confidence: 99%
“…To mitigate data redundancy and enhance data consistency, normalization of the database is necessary. Based on the functional dependencies between attributes, the normalization process involves adhering to the First Normal Form, Second Normal Form, and Third Normal Form [8]. Ultimately, upon completing the normalization process, the database is implemented using the SQL language based on MySQL database.…”
Section: Processesmentioning
confidence: 99%