An Effective Approach to Migrate Application to Secure Cloud

Article Preview

Abstract:

In cloud computing, we have requested and used many resources from cloud vendors. Even though, hypervisor is a controller between hardware level applications and user application, Hypervisor will not provide the security for running huge user applications on guest platforms. As a customer perspective cloud is the domain which will offer numerous resources. But in cloud, when the users are running various process/applications on guest OS hypervisor will give the controlling notes or components, system configure and adaptation tools only. However, hypervisor will not have a focal point about security and need to be concerned about the possible factors for an applications which are consecutively perform on the guest OS . It doesn’t care about the end users security facts. This paper proposes an efficient security mechanism for hypervisor control to be developed / performed to improve the security aspects while application is running on virtual machine.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

409-412

Citation:

Online since:

December 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chiwande V. N, Tayal A. R paper entitled as, An Approach to Balance the Load with Security for Distributed File System in Cloud, – ICESC (2014).

DOI: 10.1109/icesc.2014.51

Google Scholar

[2] Shen Chen, Wenyu dong hang Li, peng Zhang, junwei cao paper entitled as, Collaborative network security in multi-tenant data center in cloud computing, IEEE transaction volume-17, number 1, February (2014).

DOI: 10.1109/tst.2014.6733211

Google Scholar

[3] Mendes. L.D. P, Rodrigues, Lloret. J, Sendra. S Paper entitled as, Cross – layer dynamic admission control for cloud- based multimedia senor networks, IEEE transactions , (2014).

DOI: 10.1109/jsyst.2013.2260653

Google Scholar

[4] Paper entitled as, A Policy-Based Security Framework for Storage and Computation on Enterprise Data in the Cloud, IEEE transactions volume -4 march (2014).

Google Scholar

[5] Vijeng. L, Paper entitled as, Security in the cloud based systems: Structure and breaches , Internet Technology and Secured Transactions (ICITST)-(2013).

DOI: 10.1109/icitst.2013.6750260

Google Scholar