Title | Cloud Security Analysis Based on Virtualization Technology |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Zhang, Jiaxing |
Conference Name | 2022 International Conference on Big Data, Information and Computer Network (BDICN) |
Keywords | cloud computing security, cloud services, composability, compositionality, Computers, Costs, Dynamic scheduling, Hardware, Information Reuse, Network security, pubcrawl, resilience, Resiliency, security, Software, Trusted Computing, Virtualized cloud security |
Abstract | The experimental results demonstrated that, With the development of cloud computing, more and more people use cloud computing to do all kinds of things. However, for cloud computing, the most important thing is to ensure the stability of user data and improve security at the same time. From an analysis of the experimental results, it can be found that Cloud computing makes extensive use of technical means such as computing virtualization, storage system virtualization and network system virtualization, abstracts the underlying physical facilities into external unified interfaces, maps several virtual networks with different topologies to the underlying infrastructure, and provides differentiated services for external users. By comparing and analyzing the experimental results, it is clear that virtualization technology will be the main way to solve cloud computing security. Virtualization technology introduces a virtual layer between software and hardware, provides an independent running environment for applications, shields the dynamics, distribution and differences of hardware platforms, supports the sharing and reuse of hardware resources, provides each user with an independent and isolated computer environment, and facilitates the efficient and dynamic management and maintenance of software and hardware resources of the whole system. Applying virtualization technology to cloud security reduces the hardware cost and management cost of "cloud security" enterprises to a certain extent, and improves the security of "cloud security" technology to a certain extent. This paper will outline the basic cloud computing security methods, and focus on the analysis of virtualization cloud security technology |
DOI | 10.1109/BDICN55575.2022.00101 |
Citation Key | zhang_cloud_2022 |