VMM based Secured Virtualization in Cloud-Computing

P. ILA Chandana Kumari, S. Swarajya Laxmi, B. Rekha, B. Pravallika, G. Chaitanya, Syed Umar, Azeem Mohammed Abdul

Abstract


Cloud computing, utility computing, the future will be the main IT field. The government and companies are realizing that foreigners can clearly increase the cloud with minimal costs and maximum flexibility in the plant or existing equipment. But the clouds to ensure user privacy and digital asset management challenge in cloud client. Protection must always contain a performance. The complex is a sure way to end the occupation of the problem, the study suggests two Ebionitism security architecture. The movement and different approaches to health and safety and the level of the best things for their security costs hyper-visor layer to a reduction in order to avoid false alarms

Keywords


Cloud computing, Virtualization, Security.

Full Text:

PDF


DOI: http://doi.org/10.11591/ijeecs.v4.i3.pp643-648

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

The Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).

shopify stats IJEECS visitor statistics