Open Access   Article Go Back

A Study Of Cloud Computing Based On Virtualization And Security Threats

Amanpreet Kaur1 , Sawtantar Singh Khurmi2

  1. Dept. of CSE, DBU, Mandi Gobindgarh, India.
  2. Dept. of CSE, DBU, Mandi Gobindgarh, India.

Correspondence should be addressed to: cheemaaman84@yahoo.com.

Section:Review Paper, Product Type: Journal Paper
Volume-5 , Issue-9 , Page no. 108-112, Sep-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i9.108112

Online published on Sep 30, 2017

Copyright © Amanpreet Kaur, Sawtantar Singh Khurmi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Amanpreet Kaur, Sawtantar Singh Khurmi, “A Study Of Cloud Computing Based On Virtualization And Security Threats,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.108-112, 2017.

MLA Style Citation: Amanpreet Kaur, Sawtantar Singh Khurmi "A Study Of Cloud Computing Based On Virtualization And Security Threats." International Journal of Computer Sciences and Engineering 5.9 (2017): 108-112.

APA Style Citation: Amanpreet Kaur, Sawtantar Singh Khurmi, (2017). A Study Of Cloud Computing Based On Virtualization And Security Threats. International Journal of Computer Sciences and Engineering, 5(9), 108-112.

BibTex Style Citation:
@article{Kaur_2017,
author = {Amanpreet Kaur, Sawtantar Singh Khurmi},
title = {A Study Of Cloud Computing Based On Virtualization And Security Threats},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2017},
volume = {5},
Issue = {9},
month = {9},
year = {2017},
issn = {2347-2693},
pages = {108-112},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1439},
doi = {https://doi.org/10.26438/ijcse/v5i9.108112}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i9.108112}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1439
TI - A Study Of Cloud Computing Based On Virtualization And Security Threats
T2 - International Journal of Computer Sciences and Engineering
AU - Amanpreet Kaur, Sawtantar Singh Khurmi
PY - 2017
DA - 2017/09/30
PB - IJCSE, Indore, INDIA
SP - 108-112
IS - 9
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
916 532 downloads 284 downloads
  
  
           

Abstract

Cloud computing is an emerging technology based on the network that provides access to the data from server. It Cloud computing is an emerging technology based on the network that provides access to the data from server. It illustrates an extremely scalable computing asset offered as an external service Paid by Internet method. In cloud computing, mainly we have focused on virtualization, energy efficiency and security. In this paper, we conducted a survey of cloud computing which is a framework that uses different services, IaaS, PaaS, SaaS and HaaS. A comparison for the same is also explained. The concept of virtualization is also discussed following Bare metal hypervisor, Hosted hypervisor and VMM (Virtual machine migration). Different security threats have been mentioned being considered for cloud services. For the calculation of energy consumption, cloud computing uses energy efficiency concept. Work done by various authors in cloud computing has been discussed with the research gap as well.

Key-Words / Index Term

Cloud computing, Virtualization, service model, Virtual machine migration, security threats and energy efficiency

References

[1]. Ostermann, S., Iosup, A., Yigitbasi, N., Prodan, R., Fahringer, T., & Epema, D. (2009, October). A performance analysis of EC2 cloud computing services for scientific computing. In International Conference on Cloud Computing (pp. 115-131). Springer, Berlin, Heidelberg..
[2]. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58.
[3]. Qian, L., Luo, Z., Du, Y., & Guo, L. (2009). Cloud computing: An overview. Cloud computing, 626-631.
[4]. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11.
[5]. Alshammari, A., Alhaidari, S., Alharbi, A., & Zohdy, M. (2017, June). Security Threats and Challenges in Cloud Computing. In Cyber Security and Cloud Computing (CSCloud), 2017 IEEE 4th International Conference on (pp. 46-51). IEEE.
[6]. Wei, Y., & Blake, M. B. (2010). Service-oriented computing and cloud computing: Challenges and opportunities. IEEE Internet Computing, 14(6), 72-75.
[7]. Tsai, W. T., Sun, X., & Balasooriya, J. (2010, April). Service-oriented cloud computing architecture. In Information Technology: New Generations (ITNG), 2010 Seventh International Conference on (pp. 684-689). IEEE
[8]. Lombardi, F., & Di Pietro, R. (2011). Secure virtualization for cloud computing. Journal of Network and Computer Applications, 34(4), 1113-1122.
[9]. Jain, R., & Paul, S. (2013). Network virtualization and software defined networking for cloud computing: a survey. IEEE Communications Magazine, 51(11), 24-31.
[10]. Shaikh, F. B., & Haider, S. (2011, December). Security threats in cloud computing. In Internet technology and secured transactions (ICITST), 2011 international conference for (pp. 214-219). IEEE.
[11]. Kajal, N., & Ikram, N. (2015, May). Security threats in cloud computing. In Computing, Communication & Automation (ICCCA), 2015 International Conference on (pp. 691-694). IEEE.
[12]. Jain, R., & Paul, S. (2013). Network virtualization and software defined networking for cloud computing: a survey. IEEE Communications Magazine, 51(11), 24-31..
[13]. Shivlal Mewada, Arti Sharivastava, Pradeep Sharma, N Purohit and S.S. Gautam, "An Performance Analysis of Encryption Algorithm in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.83-89, 2015.
[14]. Cao, Y., Song, F., Liu, Q., Huang, M., Wang, H., & You, I. (2017). A LDDoS-aware Energy-efficient Multipathing Scheme for Mobile Cloud Computing Systems. IEEE Access.
[15]. Razaque, A., Vennapusa, N. R., Soni, N., & Janapati, G. S. (2016, April). Task scheduling in cloud computing. In Long Island Systems, Applications and Technology Conference (LISAT), 2016 IEEE (pp. 1-5). IEEE.
[16]. Mathew, T., Sekaran, K. C., & Jose, J. (2014, September). Study and analysis of various task scheduling algorithms in the cloud computing environment. In Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on (pp. 658-664). IEEE.
[17]. Arabnejad, H., Barbosa, J. G., & Prodan, R. (2016). Low-time complexity budget–deadline constrained workflow scheduling on heterogeneous resources. Future Generation Computer Systems, 55, 29-40.
[18]. Yu, J., & Buyya, R. (2006, June). A budget constrained scheduling of workflow applications on utility grids using genetic algorithms. In Workflows in Support of Large-Scale Science, 2006. WORKS`06. Workshop on (pp. 1-10). IEEE.
[19]. Ting, T. O., Rao, M. V. C., & Loo, C. K. (2006). A novel approach for unit commitment problem via an effective hybrid particle swarm optimization. IEEE Transactions on Power Systems, 21(1), 411-418.
[20]. He, Q., & Wang, L. (2007). A hybrid particle swarm optimization with a feasibility-based rule for constrained optimization. Applied mathematics and computation, 186(2), 1407-1422.
[21]. Meena, J., Kumar, M., & Vardhan, M. (2016). Cost Effective Genetic Algorithm for Workflow Scheduling in Cloud Under Deadline Constraint. IEEE Access, 4, 5065-5082.
[22]. Visheratin, A. A., Melnik, M., & Nasonov, D. (2016). Workflow scheduling algorithms for hard-deadline constrained cloud environments. Procedia Computer Science, 80, 2098-2106.
[23]. Beloglazov, A., Abawajy, J., & Buyya, R. (2012). Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future generation computer systems, 28(5), 755-768.
[24]. Chen, W., Xie, G., Li, R., Bai, Y., Fan, C., & Li, K. (2017). Efficient task scheduling for budget constrained parallel applications on heterogeneous cloud computing systems. Future Generation Computer Systems, 74, 1-11.