CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Survey on Virtualization Service Providers, Security Issues, Tools and Future Trends

by Pooja Kedia, Renuka Nagpal, Tejinder Pal Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 24
Year of Publication: 2013
Authors: Pooja Kedia, Renuka Nagpal, Tejinder Pal Singh
10.5120/12123-8491

Pooja Kedia, Renuka Nagpal, Tejinder Pal Singh . A Survey on Virtualization Service Providers, Security Issues, Tools and Future Trends. International Journal of Computer Applications. 69, 24 ( May 2013), 36-42. DOI=10.5120/12123-8491

@article{ 10.5120/12123-8491,
author = { Pooja Kedia, Renuka Nagpal, Tejinder Pal Singh },
title = { A Survey on Virtualization Service Providers, Security Issues, Tools and Future Trends },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 24 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 36-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number24/12123-8491/ },
doi = { 10.5120/12123-8491 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:31:14.273086+05:30
%A Pooja Kedia
%A Renuka Nagpal
%A Tejinder Pal Singh
%T A Survey on Virtualization Service Providers, Security Issues, Tools and Future Trends
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 24
%P 36-42
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Virtualization technology has emerged out as a cornerstone of the IT industries as it has transformed the way the IT infrastructure is deployed in the industries now a days. As virtualization provides a bundle of eye catching features such as flexibility, reduced downtime, cost effectiveness, scalability etc. therefore, it has become the driving force for leveraging IT industries. Hence, it has now become a primary need for an organization to investigate each and every aspect of virtualization before adopting it. This paper discusses the basic virtualization, types of virtualization, virtualization service provides, security issues, comparison among virtualization tools and the upcoming virtualizations trends.

References
  1. Amit Singh, 2004, An Introduction to Virtualization, http://www. kernelthread. com/publications/virtualization/
  2. Jyotiprakash Sahoo, Subasish Mohapatra, Radha Lath, 2010, Virtualization: A Survey On Concepts,Taxonomy And Associated Security Issues, 2nd International Conference on Computer and Network Technology, IEEE.
  3. Kevin McLaughlin, 2013, Data Center 100: 20 Virtualization Providers By CRN, http://www. crn. com/ slide-shows/data-enter/240146634/2013-data-center-100-20-virtualization-providers. htm.
  4. Philip Dawson, 2010, Virtualization Key Initiative Overview, http://www. gartner. com/it/initiatives/pdf/Key Initiative Overview_Virtualization. pdf.
  5. K. Scarfone, M. Souppaya, and P. Hoffman, 2011, Guide to Security for Full Virtualization Technologies, NIST Special Publication, 800-125.
  6. A. Mann, 2007, The pros and cons of virtualization BTQ, http://www. btquarterly. com/?mc=pros-cons-virtualizatio n&page=virt-view%research.
  7. Li, Y. , et al. 2010, A Survey of Virtual Machine System: Current Technology and Future Trends. Third International Symposium on Electronic Commerce and Security, IEEE.
  8. Jake McTigue, November 2012, 2013 Virtualization Management Survey, InformationWeek Reports.
  9. J. Kirch. Virtual machine security guidelines. The center for Internet Security, http://www. cisecurity. org/tools2 /vm/CIS_VM_Benchmark_v1. 0. pdf.
  10. Vimal Vaidya, 2009, "Virtualization Vulnerabilities and Threats:A Solution White Paper, RedCannon Security, Inc.
  11. Rootkit, http://en. wikipedia. org/wiki/Rootkit
  12. Jenni Susan Reuben, 2007, A Survey on Virtual Machine. Security, Seminar of Network Security, Helsinki. University of Technology.
  13. Andi Mann, EMA Senior Analyst, August 2006, Virtualization 101: Technologies, Benefits, and Challenges.
  14. APAC Virtualization Security Market To Reach $549 Mn In 2017, September 2012, http://vmblog. com/archive /2012/09/14/apac-virtualization-security-market-to-reach-549-mn-in-2017. aspx.
  15. Dave Bartoletti, February 2013, 2013 Server Virtualization Predictions: Driving Value Above And Beyond The Hypervisor http://www. zdnet. com/2013-server-virtualization-predictions-driving-value-above-and-beyond-the-hypervisor-700 0010706/.
  16. TeamQ, February 2012, Understanding Virtualization Comes with Challenges but Huge Benefits http://blog. quantum. com/index. php/2012/02/understanding-virtualization-comes-with-challenges-but-huge-benefits/.
  17. Rui Natário, November 2012, Operating System-Level Virtualization Explained, http://networksandservers. blog spot. in/2011/11/this-kind-of-server- virtualization-is. html
  18. VMware, vSphere Configuration Maximums, www. vm ware. com/pdf/vsphere5/r51/vsphere-51-configuration-maximums. pdf.
  19. Citrix, XenServer Configuration Limits, https://support. citrix. com/servlet/KbServlet/download/32312-102-92726 /CTX134789%20-%20XenServer%206. 1. 0_Configura tion%20Limits. pdf.
  20. Thomas Maurer, October 2012, Quick: Windows Server 2012 Hyper-V vs VMware vSphere 5. 1, http://www. tho masmaurer. ch/2012/10/quick-windows-server-2012-hy per-v-vs-vmware -vsphere-5-1/.
  21. SUSE LLC, Mar 2013, openSUSE 12. 3 Virtualization with KVM, http://doc. opensuse. org/documentation/html/ openSUSE/opensuse-kvm/cha. kvm. limits. html#sec. kvm. limits. geenral.
Index Terms

Computer Science
Information Sciences

Keywords

Virtual machines Security Virtualization Tools