Cloud Virtualization : An Overview
Journal Title: Engineering and Scientific International Journal - Year 2014, Vol 1, Issue 1
Abstract
Cloud computing is one of today's most exciting technology because of its cost-reducing, flexibility, and scalability. With the fast growing of cloud computing technology, Data security becomes more and more important in it. In evaluating whether to move to cloud computing, it is important to compare benefits and also risks of it. Thus, security and other existed issues in the cloud cause cloud clients need more time to think about moving to cloud environments. But Security-related topics is one of the most arguable issues in the cloud computing which caused several enterprises looks to this technology uncertainly and move toward it warily. Virtualization is a term that refers to the abstraction of computer resources. The purpose of virtual computing environment is to improve resource utilization by providing a unified integrated operating platform for users and applications based on aggregation of heterogeneous and autonomous resources. More recently, virtualization at all levels (system storage, and network) became important again as a way to improve system security, reliability and availability, reduce costs and provide greater flexibility
Authors and Affiliations
Shweta A. Gode
Literature Review: Cloud Computing–Security Issues, Technologies and Challenges
Cloud computing is drastically increasing so to make cloud computing more popular the very first step for the organization is to identify exact place where the cloud related threats lie. The changes from server to servic...
Data Mining Clustering Techniques
— Data mining is a powerful technology to extract information from the large amount of the data. Data mining is considered as one of the important field in knowledge management. Today, Data mining helps different organiz...
Real Time Vehicle Vision and Road Detection using Radio Frequency Identification
In this paper, Radio Frequency IDentification (RFID) technology is used in order to identify vehicles. RFID technology that will detect road accidents and provide details about the vehicle involved in the accident. Reade...
Biometrics Authentication using Electrocardiogram Approach
Biometrics is a secure alternative for traditional methods in identity verification [1]. Electrocardiogram (ECG) is an emerging biometric security mechanism. Biometric measures are used in many different areas and indust...
Fraud Detection Using Data Mining Techniques
The purpose of this study is to develop a data mining model for fraud detection in various fields such as online transactions (i.e) net banking, tax payers, credit cards etc. and securing data from the third parties(intr...