VMM based Secured Virtualization in Cloud-Computing
P. ILA Chandana Kumari, S. Swarajya Laxmi, B. Rekha, B. Pravallika, G. Chaitanya, Syed Umar, Azeem Mohammed Abdul
Abstract
Cloud computing, utility computing, the future will be the main IT field. The government and companies are realizing that foreigners can clearly increase the cloud with minimal costs and maximum flexibility in the plant or existing equipment. But the clouds to ensure user privacy and digital asset management challenge in cloud client. Protection must always contain a performance. The complex is a sure way to end the occupation of the problem, the study suggests two Ebionitism security architecture. The movement and different approaches to health and safety and the level of the best things for their security costs hyper-visor layer to a reduction in order to avoid false alarms
Keywords
Cloud computing, Virtualization, Security.
DOI:
http://doi.org/10.11591/ijeecs.v4.i3.pp643-648
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).
IJEECS visitor statistics