KEYWORDS: Clouds, Computer security, Image processing, Systems modeling, Data mining, Operating systems, Data modeling, Data storage, Information technology, Distributed computing
Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to
reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and
applications to be stored away from own corporate server, it brings more issues in security such as virtualization
security, distributed computing, application security, identity management, access control and authentication. Even
though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security
threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC)
in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is
designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP
systems, Image processing which requires huge resources in cloud deployed on one or more VM’s.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.