Paper
14 March 2013 Security model for VM in cloud
Venkataramana Kanaparti, Naveen Kumar R., Rajani S., Padmvathamma M., Anitha C.
Author Affiliations +
Proceedings Volume 8768, International Conference on Graphic and Image Processing (ICGIP 2012); 87686N (2013) https://doi.org/10.1117/12.2006239
Event: 2012 International Conference on Graphic and Image Processing, 2012, Singapore, Singapore
Abstract
Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and applications to be stored away from own corporate server, it brings more issues in security such as virtualization security, distributed computing, application security, identity management, access control and authentication. Even though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC) in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP systems, Image processing which requires huge resources in cloud deployed on one or more VM’s.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Venkataramana Kanaparti, Naveen Kumar R., Rajani S., Padmvathamma M., and Anitha C. "Security model for VM in cloud", Proc. SPIE 8768, International Conference on Graphic and Image Processing (ICGIP 2012), 87686N (14 March 2013); https://doi.org/10.1117/12.2006239
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Clouds

Computer security

Image processing

Systems modeling

Data mining

Operating systems

Data modeling

Back to Top