A Survey on Virtualization and Hypervisor-based Technology in Cloud Computing Environment
نویسندگان
چکیده
Cloud computing is one of the today’s largest hearing fields and exciting technologies, because it is flexible and scalable, also it reduces the cost and complexity of applications. The core technology that adds to the features of cloud computing is virtualization. Virtualization is a component of cloud computing. On the basis of virtualization cloud computing allows easy deployment of workloads and their quick scaling through the rapid provisioning of virtual or physical machines. In this paper we have discussed basic virtualization technology and also several reasons as to why it has gained immense impetus in the recent years. We have also compared the scenario before and after the advent of virtualization. Virtualization works at several levels thus, in this paper we present a view on each of these levels. We also discuss hardware virtualization techniques at the hardware level which distinguish from each other on the basis of the kind of support they expect from the hardware underneath and whether the guest should be modified or not. The entire internal working of virtualization layer is dealt by the hypervisor. Hypervisor is the fundamental element of Hardware level virtualization. Furthermore, in this paper we indicate that there exist two types of hypervisors and also discuss their security concerns along with the internal organization of the hypervisors. We also present a view on certain open issues and research directions that the researchers can consider and exploit further. Keywords—cloud computing; virtualization; operating system; hypervisor
منابع مشابه
A review of methods for resource allocation and operational framework in cloud computing
The issue of management and allocation of resources in cloud computing environments, according to the breadth of scale and modern technology implementation, is a complicated issue. Issues such as: the heterogeneity of resources, resource dependencies to each other, the dynamics of the environment, virtualization, workload diversity as well as a wide range of management objectives of cloud servi...
متن کاملImportance of Cloud Computing and its Security Issues in Network Virtualization Process
In this manuscript, the cloud computing and its security issues have been demonstrated in case of Network virtualization process. Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). Cloud co...
متن کاملA Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service
With rapid rise of virtualization technology from diverse types of cloud computing service, security problems such as data safety and reliability are the issues at stake. Since damage in virtualization layer of cloud service can cause damage on all host (user) tasks, Hypervisor that provides an environment for multiple virtual operating systems can become a target of attack by hackers. This pap...
متن کاملPerformance Evaluation of Hypervisors in the Private Cloud based on System Information using SIGAR Framework and for System Workloads using Passmark
Hypervisors using virtualization technology enable multiple operating systems to run on one physical server. Cloud computing model is less expensive because it streamlines the delivery of services by providing a stage for optimizing complex IT resources in a scalable manner with the help of virtualization technology and hypervisors. Selecting a suitable hypervisor for their organization’s priva...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016