z-logo
open-access-imgOpen Access
A Deep Study on Security Vulnerabilities in Virtualization at Cloud Computing
Author(s) -
Nayeem Ahmad Khan,
Tariq Ahmad
Publication year - 2017
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2017915204
Subject(s) - computer science , cloud computing , virtualization , computer security , cloud computing security , operating system
Virtualization is the process of creating a virtual representation of architecture. It has advantages on five components; sharing, isolation, aggregation, dynamics, and ease of management. However, issues that rise due to the nature of virtualization, especially security issues has skyrocketed. To counter this, a number of solutions has been presented in multiple literature. In this paper, a new solution to improve the security of the system is proposed. In addition, the flaws of the current implemented system are discussed, and the advantages of the proposed system over the current implemented system are listed out. General Terms Security, Cloud Computing

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom