Over the past few years, researchers have been striving for a Utility Computing Model. Cloud computing allows delivering information technology on demand. Cloud Computing service providers provides resources by means of virtualization. Applying these techniques however goes along with handling over ultimate control of data to a third party. This paper discusses several issues in virtualization security, summery of various solutions, risk prevention in VMM (virtual machine monitor). Here an attempt is made to perform the analysis of various issues pertaining to virtualization and security.
Mendeley saves you time finding and organizing research
Choose a citation style from the tabs below