Over the past few years, researchers have been striving for a Utility Computing Model. Cloud computing allows delivering information technology on demand. Cloud Computing service providers provides resources by means of virtualization. Applying these techniques however goes along with handling over ultimate control of data to a third party. This paper discusses several issues in virtualization security, summery of various solutions, risk prevention in VMM (virtual machine monitor). Here an attempt is made to perform the analysis of various issues pertaining to virtualization and security. Copyright 2010 ACM.
CITATION STYLE
Gurav, U., & Shaikh, R. (2010). Virtualization: A key feature of cloud computing. In ICWET 2010 - International Conference and Workshop on Emerging Trends in Technology 2010, Conference Proceedings (pp. 227–229). https://doi.org/10.1145/1741906.1741957
Mendeley helps you to discover research relevant for your work.