Security in a Virtualised Computing

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 3

Abstract

 Do the security challenges posed by virtualisation make it a non-starter for your sensitive business applications? There is much debate about cloud computing, which promises to deliver utility-based virtual computing to the front door of every company. Some are dismissing it as marketing hype – but if it delivers the benefits it claims, it has the potential to transform enterprise computing. So what are the challenges – and what are the opportunities posed by this development?

Authors and Affiliations

E. Geetha Ran

Keywords

Related Articles

 Energy Efficient and Secure, Trusted network discovery for  Wireless Sensor Networks

 While routing Wireless Sensor nodes in the Multi-hop network ,nodes may undergo some attacks such as sink hole attack, worm hole attack, Sybil attack etc., by the attackers through identity deception. So, to &n...

Detecting contiguous regions having traffic problems using taxi trajectories

Nowadays, taxi is one of the most popular transportation modes. There is a large amount of passenger using taxi everyday and taxi trajectories represent the mobility of people. In the big cities, taxi is equipped GPS dev...

A Hierarchical and Grid Based Clustering Method for Distributed Systems (Hgd Cluster)

Abstract: In distributed peer-to-peer systems, huge amount of data are dispersed. Grouping of those data from multiple sources is a tedious task. By applying effective data mining techniques the clustering of distributed...

 A Comparative Study of Contrast Enhancement using Image Fusion

 Abstract: Image enhancement is used to improve the visual quality of an image. In this paper a different approach on image fusion has been described for image enhancement. The two main algorithms involved in this...

 An Efficient Method to Prevent Information Leakage in Cloud

 Abstract : Cloud Computing is storing and accessing data and programs over the Internet instead of personal computers. It is a computing paradigm shift where computing is moved away from personal computers or an in...

Download PDF file
  • EP ID EP99048
  • DOI -
  • Views 142
  • Downloads 0

How To Cite

E. Geetha Ran (2013).  Security in a Virtualised Computing. IOSR Journals (IOSR Journal of Computer Engineering), 14(3), 50-54. https://www.europub.co.uk/articles/-A-99048