Survey on virtual machine security  

Abstract

Virtualization takes a major role in cloud environment. It is the creation of a virtual (rather than actual) version of something, such as a hardware platform, operating system (OS), storage device, or network resources This paper deals with various virtual machine security mechanism in cloud environment where we can access virtual hard disk, virtual servers in pay as you go manner. It also explains about kernel attack, critical problem in virtualization and how the security architectures are used to solve that issue are explained in this paper. It is the survey of various cloud virtual machine architectures, advantages & disadvantages.  

Authors and Affiliations

Bright Prabahar P , Bijolin Edwin E

Keywords

Related Articles

Geographical Routing in Intermittently Connected MANETs with Guaranteed Delivery at Void Locations  

The major challenges in MANETs are finding the destination, routing and robust communication dealing with constant topology change. When there is no end to end path at any given time between source and destination...

Memory Learning Framework for Retrieval of Neural Objects 

Most current content-based image retrieval systems are still incapable of providing users with their desired results. The major difficulty lies in the gap between low-level image features and high-level image seman...

Authentication for Online Voting Using Steganography and Biometrics 

In this paper an online voting authentication technique is proposed which provides biometric as well as password security to voter accounts. Voters are first identified by their facial image by using PCA. Second st...

A SECURE MEDICAL IMAGE WATERMARKING TECHNIQUE USING NO-REFERENCE QUALITY METRICES  

In this paper, a secure medical image watermarking technique with No-Reference quality measurement method based on spread spectrum technique and discrete wavelet transform using ROI processing is proposed. In this me...

Improving ontology and precision recall using ontology model, genetic, greedy algorithm semantic similarity calculation and ontology graph 

The content is extracted by means of semantic relevancy. The semantic relevancies relate the content of videos based on a certain parameter. The parameter varies between system to system (implementation). The paramet...

Download PDF file
  • EP ID EP162046
  • DOI -
  • Views 64
  • Downloads 0

How To Cite

Bright Prabahar P, Bijolin Edwin E (2012). Survey on virtual machine security  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(8), 115-121. https://europub.co.uk/articles/-A-162046