Survey on virtual machine security
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
Virtualization takes a major role in cloud environment. It is the creation of a virtual (rather than actual) version of something, such as a hardware platform, operating system (OS), storage device, or network resources This paper deals with various virtual machine security mechanism in cloud environment where we can access virtual hard disk, virtual servers in pay as you go manner. It also explains about kernel attack, critical problem in virtualization and how the security architectures are used to solve that issue are explained in this paper. It is the survey of various cloud virtual machine architectures, advantages & disadvantages.
Authors and Affiliations
Bright Prabahar P , Bijolin Edwin E
Geographical Routing in Intermittently Connected MANETs with Guaranteed Delivery at Void Locations
The major challenges in MANETs are finding the destination, routing and robust communication dealing with constant topology change. When there is no end to end path at any given time between source and destination...
Memory Learning Framework for Retrieval of Neural Objects
Most current content-based image retrieval systems are still incapable of providing users with their desired results. The major difficulty lies in the gap between low-level image features and high-level image seman...
Authentication for Online Voting Using Steganography and Biometrics
In this paper an online voting authentication technique is proposed which provides biometric as well as password security to voter accounts. Voters are first identified by their facial image by using PCA. Second st...
A SECURE MEDICAL IMAGE WATERMARKING TECHNIQUE USING NO-REFERENCE QUALITY METRICES
In this paper, a secure medical image watermarking technique with No-Reference quality measurement method based on spread spectrum technique and discrete wavelet transform using ROI processing is proposed. In this me...
Improving ontology and precision recall using ontology model, genetic, greedy algorithm semantic similarity calculation and ontology graph
The content is extracted by means of semantic relevancy. The semantic relevancies relate the content of videos based on a certain parameter. The parameter varies between system to system (implementation). The paramet...