Next-Generation Optimization Models and Algorithms in Cloud and Fog Computing Virtualization Security: The Present State and Future

5Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Virtualization is becoming popular and is gaining widespread attention in recent years. However, with its popularity comes the challenge of securing the virtualized environment. Security measures for virtualized systems cannot always be applied in the same manner as in physical systems. Virtualized environments may have multiple virtual systems on the same physical machine, so different levels of security one needed. The hypervisor is the controlling program that provides the virtual systems' effective isolation and security. In this article, we present a comprehensive review of the existing security ideas and architectures for virtualized environment and some of the open issues in virtualization security.

Cite

CITATION STYLE

APA

Verma, R., Rane, D., Jha, R. S., & Ibrahim, W. (2022). Next-Generation Optimization Models and Algorithms in Cloud and Fog Computing Virtualization Security: The Present State and Future. Scientific Programming. Hindawi Limited. https://doi.org/10.1155/2022/2419291

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free