Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/536361
Title: | Efficient Methodologies For Virtualization Security In Cloud Computing |
Researcher: | Anitha H M |
Guide(s): | P Jayarekha |
Keywords: | Computer Science Computer Science Software Engineering Engineering and Technology |
University: | Visvesvaraya Technological University, Belagavi |
Completed Date: | 2023 |
Abstract: | newline Cloud computing is a computing paradigm where services (e.g., networks, servers, storage, applications, and services) are delivered and accessed over a network in a distributed environment. It enables ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider s interaction. Cloud users host the applications and store data in cloud provider s domain. Cloud has been essential technology for millions of users to provide and utilize the services through virtual machines. Virtual Machine provide the facilities of actual machine such as computation power and storage. Storage and processing of sensitive information using Virtual Machines need to be secured to overcome the threats. Hence the proposed research work explores and implements efficient methodologies for providing security to virtual machines in the cloud. Security is the major concern in the cloud environment to take care of security parameters Integrity, Confidentiality, Reliability and Availability. In this thesis, we propose various techniques to achieve Security for Virtual Machines. These techniques include Trust based Methods, Software Defined Network Framework and cryptographic algorithms. We show through simulations that our approach is able to mitigate to the various threats. The efficiency of the various methods is demonstrated and compared with the existing methodologies. iii Building trust between Cloud service provider and Cloud user is an essential factor for receiving the secured services during the Virtual machine deployment. Hybrid trust model is proposed, to find the trusted Cloud service providers, so that the users are deployed in secured environment. Virtual machine once registered they need to be authenticated before authorizing the service. Virtual machine access is granted after verification of user s credentials using multistage authentication approach. |
Pagination: | |
URI: | http://hdl.handle.net/10603/536361 |
Appears in Departments: | B M S College of Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
80_recommendation.pdf | Attached File | 93.64 kB | Adobe PDF | View/Open |
annexures.pdf | 246.55 kB | Adobe PDF | View/Open | |
chapter1.pdf | 247.92 kB | Adobe PDF | View/Open | |
chapter2.pdf | 222.11 kB | Adobe PDF | View/Open | |
chapter3.pdf | 708.93 kB | Adobe PDF | View/Open | |
chapter4.pdf | 439.6 kB | Adobe PDF | View/Open | |
chapter5.pdf | 400.26 kB | Adobe PDF | View/Open | |
contents.pdf | 143.28 kB | Adobe PDF | View/Open | |
preliminarypages.pdf | 223.81 kB | Adobe PDF | View/Open | |
title.pdf | 48.99 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: