UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 5 Issue 12
December-2018
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIRDZ06086


Registration ID:
233640

Page Number

672-680

Share This Article


Jetir RMS

Title

Virtualization and Security in Cloud Computing

Abstract

Cloud computing is the most prominent technology in today’s world, as it can make less the cost value and problems or usage problems or complexity of applications. Cloud computing is capable of bending easily without breaking and it has an attribute that relate the potentiality or expertise of process, ability of network and software or organization to grow and managed increased demand. Cloud Computing is scalable because cloud computing is more adaptable to changing needs of its users. There are various advantages or profit gained by cloud computing that make changes in speedily growing technologies now a days. Cloud computing is going to be main identifiable part of the large internet or future developing internet. This technology Cloud computing is important to worthy of attention an event constituting a new stage in a changing situation. This is making practical and effective use of growing computational ability. Cloud Computing raises to a higher standards in data scattering and data storage facilities improve by adding or replacing components. It is extremely important details or facts to be saved in the cloud with the cloud information services. Virtualization means create or make a virtual version which is not the actual one it means create a version rather than actual. Virtualization is that term to define the quality of dealing with ideas rather than events it’s all about to resources specially resources of computer. The action of making practical and effective use of resources or assets can be become well with the help of virtualization technology. This makes available for use the action or process of combination to the raised level surface on which user can stands. Virtualization gives the aggregation to the heterogeneous resources and the autonomous behaviour of the resources to the users and the customers.

Key Words

Cloud Computing, Virtualization, Security, CSP, CSA, CRM, Auditing.

Cite This Article

"Virtualization and Security in Cloud Computing", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.5, Issue 12, page no.672-680, December 2018, Available :http://www.jetir.org/papers/JETIRDZ06086.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Virtualization and Security in Cloud Computing", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 12, page no. pp672-680, December 2018, Available at : http://www.jetir.org/papers/JETIRDZ06086.pdf

Publication Details

Published Paper ID: JETIRDZ06086
Registration ID: 233640
Published In: Volume 5 | Issue 12 | Year December-2018
DOI (Digital Object Identifier):
Page No: 672-680
Country: -, -, - .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002907

Print This Page

Current Call For Paper

Jetir RMS