International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-11,Issue-12  ( Dec, 2023 )
  2. Volume-11,Issue-11  ( Nov, 2023 )
  3. Volume-11,Issue-10  ( Oct, 2023 )
  4. Volume-11,Issue-9  ( Sep, 2023 )
  5. Volume-11,Issue-8  ( Aug, 2023 )
  6. Volume-11,Issue-7  ( Jul, 2023 )
  7. Volume-11,Issue-6  ( Jun, 2023 )
  8. Volume-11,Issue-5  ( May, 2023 )
  9. Volume-11,Issue-4  ( Apr, 2023 )
  10. Volume-11,Issue-3  ( Mar, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 133
Paper Published : 1552
No. of Authors : 4025
  Journal Paper


Paper Title :
Secure Hypervisor Technology For Protecting User Content In Cloud Environment By Using Fuzzy Techniques

Author :R. Poorvadevi, S. Rajalakshmi, G. Supraja Devi

Article Citation :R. Poorvadevi ,S. Rajalakshmi ,G. Supraja Devi , (2015 ) " Secure Hypervisor Technology For Protecting User Content In Cloud Environment By Using Fuzzy Techniques " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 31-34, Volume-3, Issue-1

Abstract : Cloud computing is a forum to access the enormous amount of services by any users who resides on the web. There will be number of services available in cloud environment. However, people can consume any services which are offered by the cloud service provider still there will be an unsolved issue is security and privacy. Everything –as-a-service in cloud computing, even though cloud providing one among the service is security-as-a-service but, still users are afraid to keep their data without setting the individual user security parameters on the cloud. The latest technology or trend is, instead of stealing the content, data, confidential transaction information from different virtual machine, hackers are attempting to attack the entire hypervisor part. Because, all the applications are processing in virtual machine (guest OS) which resides on the hypervisor controller. Even though distinguished approaches, methodologies are coming with the new scope to prevent the user data in cloud we need to analyze and determine the security work product in an efficient manner. So, this proposed model bringing a new solution for adopting any cloud services without any fear by using the hypervisor technology along with the simulated and compared set of fuzzy functionalities. It will ensure that the rate of hypervisor stealing in different tool set along with the measurement policies to protect the cloud user’s data in a secured approach.

Type : Research paper

Published : Volume-3, Issue-1


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1600   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 89
| Published on 2015-01-05
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY