Senthil Kumar R and Prakadeswaran S, Department of CSE, Shree Venkateshwara Hi-Tech Engineering College, Gobi, Erode, Tamil Nadu, India.
International Journal of Advanced Computing and Communication Systems
ISSN (Online) : 2347 - 9299
ISSN (Print) : 2347 - 9280
Received On :
Revised On :
Accepted On :
Published On :
Volume 02, Issue 03
Page No : 001-005
Cloud is a transformative approach for delivering IT services that drive business innovation and agility while lowering overall IT costs. The journey to the cloud introduces several key challenges when it comes to ynamic cloud environments though. To be successful, management approaches and tools must mirror the cloud's ability to quickly adapt to changing conditions based on infrastructure performance, application needs and user demands. Virtualization technology is the focus of many new potential threats and exploits and presents new vulnerabilities that must be managed. Security applied to accessibility of data process in batch audit computing. It also connect to network infrastructure and storage networks and require careful planning with regard to access controls, user permissions, and traditional security controls, Security architecture, policies and processes will need to adapt to work within a cloud infrastructure. The hypervisor will transparently proxy all communication between the guest and the host hardware, hiding its existence from the guest so the guest believes it’s the only system running on that hardware.
Data Security, Virtualization, Hypervisor, Virtual, Machine Monitor Third-party service.
Senthil Kumar R and Prakadeswaran S, “Data Security virtualization with implications in batch Audit Cloud,” International Journal of Advanced Computing and Communication Systems, pp. 001-005, November, 2015.
© 2015 Senthil Kumar R and Prakadeswaran S. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Download