Skip to main content

Role of Virtualization Techniques in Cloud Computing Environment

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 760))

Abstract

In Internet, cloud computing plays an important role to share information and data. Virtualization is an important technique in the cloud environment to share data and information. It is also important computing environment to enables academic IT resources or industry through on-demand dynamically allocation. The main aim of this research paper is to explore the basic knowledge terms of the virtualization and how virtualization works in cloud system. We will explain about how to maintain the virtualization with optimized resources such as storage, network, application, server, and client in cloud computing. We will compare different open-source-based hypervisors or virtual monitor machines (VMM) that are in use today, and we will discuss several issues of virtualization which will be very helpful to the researchers for further study.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Loganayagi, B., Sujatha, S.: Creating virtual platform for cloud computing. In: IEEE International Conference on Computational Intelligence and Computing Research (ICCIC 2010), pp. 1–4 (2010)

    Google Scholar 

  2. Karen, S., Murugiah, S., Paul, H.: Guide to Security for Full Virtualization Technologies, pp. 1–35. Special Publication National Institute of Standards and Technology (NIST) (2011)

    Google Scholar 

  3. Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization:. In: Proceedings of the 19th ACM Symposium on OS Principles. SOSP, pp. 164–177 (2003)

    Google Scholar 

  4. Dawei, S., Guiran, C., Qiang, G., Chuan, W., Xingwei, W.: A dependability model to enhance security of cloud environment using system-level virtualization techniques. In: 1st International Conference on Pervasive Computing. Signal Processing and Applications (PCSPA), pp. 305–310 (2010)

    Google Scholar 

  5. Joanna, R., Alexander, T.: Bluepilling the Xen Hypervisor. In: Xen owning Trilogy par-III, Black Hat USA, 2008, pp. 1–85 (2008)

    Google Scholar 

  6. Samuel, T.K., Chen, P.M., Yi-min, W., Chad, V., Helen, W., Jacob, R., Lorch, S.: Implementing malware with Vms. In: IEEE Symposium on Security and Privacy, pp. 314–327 (2006)

    Google Scholar 

  7. Rosenblum, M., Garfinkel, T.: Virtual machine monitors: current technology and future trends. IEEE Comput. Sci. 38(5), 39–47 (2005)

    Article  Google Scholar 

  8. Popek, G.J., Goldberg, R.P.: Formal requirements for virtualizable third generation architectures. Commun. ACM 17(7), 412–421 (1974)

    Google Scholar 

  9. Farzad, S.: Intrusion detection techniques performance in cloud environments. In: Proceedings Conference on Computer Design and Engineering. Kuala Lumpur, Malaysia, pp. 398–402 (2011)

    Google Scholar 

  10. Obasuyi, G.C., Arif, S.: Security challenges of virtualization hypervisors in virtualized hardware environment. Int. J. Commun. Netw. Syst. Sci. 08(07), 260–273 (2015)

    Google Scholar 

  11. Chen, W., Lu, H., Shen, L., Wang, Z., Xiao, N., Chen, D.: A novel hardware assisted full virtualization technique. In: A Novel Hardware Assisted Full Virtualization Technique (IEEE, 2008), pp. 1292–1297 (2008)

    Google Scholar 

  12. Microsoft 2008 desktop virtualization strategy. http://download.microsoft.com/download/6/F/8/6F8EF4-26BD-48EABF45BFF00A3B5990/Micros%20Client%20Virtualization%20Strategy%20White%20Paper_final.pdf

  13. Spruijt, R.: Desktop virtualization and the power of App-V and Windows. http://www.brianmadden.com/blogs/rubenspruijt/archive/2010/02/22/desktopvirtualizationand-the-power-of-windows-7.asp

  14. Sarna, D.E.Y.: Implementing and Developing Cloud Computing Applications. Taylor and Francis Group, LLC, (2011)

    Google Scholar 

  15. Macro, A., Valerio, B., Alberto, C., Marco, C., Ernesto, D., Fulvio, F., Joel, T.H., Davide, R.: Learning computer networking on open paravirtual laboratories. In: IEEE Trans. Educ. 50(4), 302–311 (2007)

    Google Scholar 

  16. Daniel, N., Rich, W., Chris, G., Graziano, O., Sunil, S., Lamia, Y., Dmitrii, Z.: The eucalyptus open-source cloud-computing system. In: Proceedings of Cloud Computing and Its Applications. pp. 1–16 (2014)

    Google Scholar 

  17. Katarzyna, K., Ian, F., Timothy, F., Xuehai, Z., Daniel, G.: Virtual workspaces in the grid. Lecture Notes in Computer Science, vol. 3648, pp. 421–431 (2005)

    Google Scholar 

  18. Muditha, P., Keppitiyagama, C.: A performance comparison of hypervisors. In: A Performance Comparison of Hypervisors, IEEE, 2011, edn., pp. 120–120 (2011)

    Google Scholar 

  19. Chawdhry, A., Mance, C.: Virtualization: providing better computing to universities. In: Information Systems Educators Conferenc (ISECON) Nashville Tennessee, USA, vol. 27, no. 1401, pp. 1–7 (2010)

    Google Scholar 

  20. Kanungo, P.: Efficient resource management in cloud computing using virtualization. Int. J. Adv. Res. Comput. Commun. Eng. 5(4), 650–652 (2016)

    Google Scholar 

  21. Ramakrishnan, L., Canon, R.S., Muriki, K., Sakrejda, I., Wright, N.J.: Evaluating interconnect and virtualization performance for high performance computing. In: ACM 2nd International Workshop on Performance Modeling, Benchmarking & Simulation of High Performance Computing Systems, pp. 1–2 (2011)

    Google Scholar 

  22. G5Networks–Technology Partner (2013). http://www.g5networks.net/virtualization.html

  23. Watfa, M.K., Udoh, V.A., Al Abdulsalam, S.M.: An educational virtualization infrastructure. In: ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016, pp. 12–21 (2016)

    Google Scholar 

  24. Riskhan, B., Muhammed, R.: Enhancing the performance of current online education system—a study of cloud computing and virtualization. J. Comput. Commun. 3, 43–51 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Geeta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Geeta, Prakash, S. (2019). Role of Virtualization Techniques in Cloud Computing Environment. In: Bhatia, S., Tiwari, S., Mishra, K., Trivedi, M. (eds) Advances in Computer Communication and Computational Sciences. Advances in Intelligent Systems and Computing, vol 760. Springer, Singapore. https://doi.org/10.1007/978-981-13-0344-9_37

Download citation

Publish with us

Policies and ethics