Secure Virtual Machines Admission Control in Cloud Computing

Omnia Abdelrahem Mohamed;

Abstract


Cloud computing is a fast spreading model for service delivery, widely adapted in today’s IT environment. It is a combination of other technologies working together, one of them is virtualization, which is the abstraction of computer resources, separating the physical resources from the final resources delivered to the user. Regardless of its wide spread, cloud computing still has security concerns, also there are the threats related to virtualization that are inherited by the cloud.

In the late 90s and the beginning of 2000 the dependence on computer systems increased more and more and it became a part of every industry, even an important part of our daily lives. But for starting and small businesses this dependence started to create a problem because this increased their costs as they are required to purchase computer systems and to hire skilled persona to handle them.

This is where the idea of time sharing started to seem like the solution. The idea of sharing resources in the IT industry is not new, it is as old as the start of the computer industry itself. The idea became known and started to spread with the UNIX operating system introduced in the 1960s. It allows different users to work together simultaneously on the same hardware, which helped in spreading of the computer technology by lowering the cost. Here again with the same idea companies can change from owning its hardware and software -which they must buy to use while they don’t actually need all the features and capabilities of it or they may need to scale it in tight time frame- to service based per use model which is introduced by cloud computing where the company doesn’t need


Other data

Title Secure Virtual Machines Admission Control in Cloud Computing
Other Titles تأمين التحكم في القبول للأجهزة الافتراضية في الحوسبة السحابية
Authors Omnia Abdelrahem Mohamed
Issue Date 2017

Attached Files

File SizeFormat
J5081.pdf435.63 kBAdobe PDFView/Open
Recommend this item

Similar Items from Core Recommender Database

Google ScholarTM

Check



Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.