International Journal of Advance Computational Engineering and Networking (IJACEN)
current issues
Volume-8,Issue-4  ( Apr, 2020 )
Past issues
  1. Volume-8,Issue-3  ( Mar, 2020 )
  2. Volume-8,Issue-2  ( Feb, 2020 )
  3. Volume-8,Issue-1  ( Jan, 2020 )
  4. Volume-7,Issue-12  ( Dec, 2019 )
  5. Volume-7,Issue-11  ( Nov, 2019 )
  6. Volume-7, Issue-10  ( Oct, 2019 )
  7. Volume-7, Issue-9  ( Sep, 2019 )
  8. Volume-7, Issue-8  ( Aug, 2019 )
  9. Volume-7, Issue-7  ( Jul, 2019 )
  10. Volume-7, Issue-6  ( Jun, 2019 )

Statistics report
Jul. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 87
Paper Published : 1230
No. of Authors : 3094
  Journal Paper

Paper Title
Secure Hypervisor Technology For Protecting User Content In Cloud Environment By Using Fuzzy Techniques

Cloud computing is a forum to access the enormous amount of services by any users who resides on the web. There will be number of services available in cloud environment. However, people can consume any services which are offered by the cloud service provider still there will be an unsolved issue is security and privacy. Everything –as-a-service in cloud computing, even though cloud providing one among the service is security-as-a-service but, still users are afraid to keep their data without setting the individual user security parameters on the cloud. The latest technology or trend is, instead of stealing the content, data, confidential transaction information from different virtual machine, hackers are attempting to attack the entire hypervisor part. Because, all the applications are processing in virtual machine (guest OS) which resides on the hypervisor controller. Even though distinguished approaches, methodologies are coming with the new scope to prevent the user data in cloud we need to analyze and determine the security work product in an efficient manner. So, this proposed model bringing a new solution for adopting any cloud services without any fear by using the hypervisor technology along with the simulated and compared set of fuzzy functionalities. It will ensure that the rate of hypervisor stealing in different tool set along with the measurement policies to protect the cloud user’s data in a secured approach.

Author - R. Poorvadevi, S. Rajalakshmi, G. Supraja Devi

| PDF |
Viewed - 81
| Published on 2015-01-05
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World