Virtualization – A key feature of cloud computing

  • Gurav U
  • Shaikh R
  • 66

    Readers

    Mendeley users who have this article in their library.
  • 14

    Citations

    Citations of this article.

Abstract

Over the past few years, researchers have been striving for a Utility Computing Model. Cloud computing allows delivering information technology on demand. Cloud Computing service providers provides resources by means of virtualization. Applying these techniques however goes along with handling over ultimate control of data to a third party. This paper discusses several issues in virtualization security, summery of various solutions, risk prevention in VMM (virtual machine monitor). Here an attempt is made to perform the analysis of various issues pertaining to virtualization and security.

Author-supplied keywords

  • cloud computing
  • virtualization security

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document

Authors

  • U. Gurav

  • R. Shaikh

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free