Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/536361
Title: Efficient Methodologies For Virtualization Security In Cloud Computing
Researcher: Anitha H M
Guide(s): P Jayarekha
Keywords: Computer Science
Computer Science Software Engineering
Engineering and Technology
University: Visvesvaraya Technological University, Belagavi
Completed Date: 2023
Abstract: newline Cloud computing is a computing paradigm where services (e.g., networks, servers, storage, applications, and services) are delivered and accessed over a network in a distributed environment. It enables ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider s interaction. Cloud users host the applications and store data in cloud provider s domain. Cloud has been essential technology for millions of users to provide and utilize the services through virtual machines. Virtual Machine provide the facilities of actual machine such as computation power and storage. Storage and processing of sensitive information using Virtual Machines need to be secured to overcome the threats. Hence the proposed research work explores and implements efficient methodologies for providing security to virtual machines in the cloud. Security is the major concern in the cloud environment to take care of security parameters Integrity, Confidentiality, Reliability and Availability. In this thesis, we propose various techniques to achieve Security for Virtual Machines. These techniques include Trust based Methods, Software Defined Network Framework and cryptographic algorithms. We show through simulations that our approach is able to mitigate to the various threats. The efficiency of the various methods is demonstrated and compared with the existing methodologies. iii Building trust between Cloud service provider and Cloud user is an essential factor for receiving the secured services during the Virtual machine deployment. Hybrid trust model is proposed, to find the trusted Cloud service providers, so that the users are deployed in secured environment. Virtual machine once registered they need to be authenticated before authorizing the service. Virtual machine access is granted after verification of user s credentials using multistage authentication approach.
Pagination: 
URI: http://hdl.handle.net/10603/536361
Appears in Departments:B M S College of Engineering

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File93.64 kBAdobe PDFView/Open
annexures.pdf246.55 kBAdobe PDFView/Open
chapter1.pdf247.92 kBAdobe PDFView/Open
chapter2.pdf222.11 kBAdobe PDFView/Open
chapter3.pdf708.93 kBAdobe PDFView/Open
chapter4.pdf439.6 kBAdobe PDFView/Open
chapter5.pdf400.26 kBAdobe PDFView/Open
contents.pdf143.28 kBAdobe PDFView/Open
preliminarypages.pdf223.81 kBAdobe PDFView/Open
title.pdf48.99 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: