CFP last date
22 April 2024
Reseach Article

The Role of Virtualization Techniques to Overcome the Challenges in Cloud Computing

by Ahmad Mateen, Amir Waheed
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 143 - Number 9
Year of Publication: 2016
Authors: Ahmad Mateen, Amir Waheed
10.5120/ijca2016910335

Ahmad Mateen, Amir Waheed . The Role of Virtualization Techniques to Overcome the Challenges in Cloud Computing. International Journal of Computer Applications. 143, 9 ( Jun 2016), 7-11. DOI=10.5120/ijca2016910335

@article{ 10.5120/ijca2016910335,
author = { Ahmad Mateen, Amir Waheed },
title = { The Role of Virtualization Techniques to Overcome the Challenges in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 143 },
number = { 9 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume143/number9/25103-2016910335/ },
doi = { 10.5120/ijca2016910335 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:45:52.762674+05:30
%A Ahmad Mateen
%A Amir Waheed
%T The Role of Virtualization Techniques to Overcome the Challenges in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 143
%N 9
%P 7-11
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a new trend which increase application ability in terms of functionality, resource management and collaborative aspect in term of distributed as well as centralized computing environment. Cloud computing system produce new disputes because of system clusters and high volume data generated by these systems. Storage virtualization makes stockpiling a ware. This makes for some intriguing courses for organizations to lessen their expenses. The central part of cloud computing is virtualization which enables industry or academic IT resources through on-demand allocation dynamically. The main importance in cloud computing is virtualization, which perform user requests on different logical machines in term of their execution in a predefined manner. Cloud computing is unquestionably conceivable without virtualization, however requires more work and time to really pull it off; by utilizing virtualization, it would be fundamentally getting a great deal of the work accomplished for nothing. The resources can be multiple networks in a client server environment having storage as well as applications. The main purpose of this research is how to increase resource management with virtualization which will improve the performance of cloud computing resource allocation its challenges and proposed new approach which will helpful to optimize the performance in sharing network infrastructure.

References
  1. Bhuvnesh P., T.Sharma, S.Jarged,20l6.” Virtualization Techniques In Cloud Computing”, Imperial Journal of Interdisciplinary Research 5(2): 2454-l36.
  2. Almond C, 20l3. "A Practical Guide to Cloud Computing Security", Black Hat conference, l5(6): 2l3-765.
  3. Asma, L., A. Haji, M. Jebalia, S. Tabbane, 2010. State of the Art and Research Challenges of new services architecture technologies: Virtualization, SOA and Cloud Computing‖. International Journal of Grid and Distributed Computing 3(4): 69-88.
  4. Barham, P., B. Dragovic, K Fraser ,S Hand ,T Harris, 20l2.Xen and the art of virtualization in operating systems principles,", International Journal of Engineering Research & Innovation, l0(3):l64–l77
  5. Dragovic, B., P. Barham , K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield,20l2 .Xen and the art of virtualization‖, In SOSP ’03: Proceedings of the nineteenth ACM symposium on operating systems principles, 8(2) :l64–l77.
  6. Dawoud, W., I. Takouna, and C. Meinel, 20l0. Infrastructure as a service security: Challenges and solutions‖, in Proc. Informatics and Systems (INFOS), The 7th International Conference, l6(5): l –8.
  7. Dell, "Overcoming 7 Key Challenges to Virtualization", http://www.dell.com/downloads/global/power/pslq09-5oo9ol98-F5.pdf, 20l3.
  8. Feldhaus, F., S. Freitagand C. El Amrani, 2011. “Large-Scale Computing Techniques for Complex System Simulations”,Wiley-IEEE Computer Society, 23(8): 2l-56.
  9. IBM Virtual Infrastructure Access Service Product. https://www-935.ibm.com/services/au/ gts/pdf/ endo3oo5 usen.pdf.
  10. Jorjien, X., Z. Xiao and Y. Xiao, 2013. Security and Privacy in Cloud Computing‖, IEEE Communications Surveys & Tutorials, l5(2): 843–859.
  11. Kim, S., F. Machida, and K. S. Trivedi, 20l2. “Availability Modeling and Analysis of a Virtualized System,” in Proceedings of the l5th IEEE Pacific Rim International Symposium on Dependable Computing, l5(2): 365–37l.
  12. Mell, P., T. Grance, 2011. The NIST Definition of Cloud Computing‖, National Institute of Standards and Technology, Information Technology Laboratory, l2(4): 324-456.
  13. Qian, H., D. Medhi, and K. Trivedi, 2011. “A Hierarchical Modelto Evaluate Quality of Experienceof Online Services hostedby Cloud Computing,” 5(3): l–8
  14. Rutkowska,J., 20l0. "Subverting Vista Kernel for Fun and Profit",Black Hat conference, l6(5): 76-234.
  15. Perez, S., 20l4. Mobile cloud computing: $9.5 billion by 20l4‖, http://exoplanet.eu/catalog.php.
  16. Scarfone, K., M. Souppaya, and P. Hoffman, 2011. Guide to Security for Full Virtualization Technologies‖, National Institute of Standards and Technology, l8(8): 800-l25.
  17. Siddhisena, B., L. Wruasawithana, M. Mendis, 20ll. Next generation multitenant virtualization cloud computing platform‖, In: Proceedings of l3th International conference on advanced communication technology, l2(3): 405–l0.
  18. Sun, Y., H. Yan, C. Lu, R. Bie, Z. Zhou, 20l4. Constructing the web of events from raw data in the web of things. Mobile InfSyst lo(l): l05–l25.
  19. Tim, M., S. Kumaraswamy, S. Latif, 20ll. Cloud Security and Privacy: An Enterprise Edition on Risks and Compliance‖", International Journal of Engineering Research & Innovation, l0(3): l64–l77.
  20. Timur, M., B. Yang, 20l0. "Securing Virtualized Datacenters", International Journal of Engineering Research & Innovation, 2(l): 43-76.
  21. Urgaonkar, B., P. Shenoy, A. Chandra, P. Goyal, T. Wood, 20l0.Agile dynamic provisioning of multi-tier Internet applications, ACM Trans Auton Adaptive Syst 5(5): l39–48.
  22. Ashwini, K., V.R. Wadhankar,2011 “Security Enhancement for Privacy Preservation in Cloud Computing by Anonymous Request Access” International Journal of Engineering Research & Innovation, 4(1): 139-142.
Index Terms

Computer Science
Information Sciences

Keywords

Challenges cloud computing elasticity hypervisor virtualization