JOURNAL ARTICLE

Cloud Security Analysis Based on Virtualization Technology

Jiaxing Zhang

Year: 2022 Journal:   2022 International Conference on Big Data, Information and Computer Network (BDICN) Vol: 21 Pages: 519-522

Abstract

The experimental results demonstrated that, With the development of cloud computing, more and more people use cloud computing to do all kinds of things. However, for cloud computing, the most important thing is to ensure the stability of user data and improve security at the same time. From an analysis of the experimental results, it can be found that Cloud computing makes extensive use of technical means such as computing virtualization, storage system virtualization and network system virtualization, abstracts the underlying physical facilities into external unified interfaces, maps several virtual networks with different topologies to the underlying infrastructure, and provides differentiated services for external users. By comparing and analyzing the experimental results, it is clear that virtualization technology will be the main way to solve cloud computing security. Virtualization technology introduces a virtual layer between software and hardware, provides an independent running environment for applications, shields the dynamics, distribution and differences of hardware platforms, supports the sharing and reuse of hardware resources, provides each user with an independent and isolated computer environment, and facilitates the efficient and dynamic management and maintenance of software and hardware resources of the whole system. Applying virtualization technology to cloud security reduces the hardware cost and management cost of "cloud security" enterprises to a certain extent, and improves the security of "cloud security" technology to a certain extent. This paper will outline the basic cloud computing security methods, and focus on the analysis of virtualization cloud security technology

Keywords:
Virtualization Cloud computing Computer science Cloud computing security Full virtualization Service virtualization Data virtualization Virtual machine Hardware virtualization Application virtualization Cloud testing Operating system Distributed computing Computer security Computer network

Metrics

2
Cited By
0.33
FWCI (Field Weighted Citation Impact)
9
Refs
0.49
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Hypervisor-Based Virtualization In Cloud Computing: Performance And Security Analysis

Namita ChawlaAsita GhewariSatish PawarPravin ThoratRajendra JaradGururaj DangareSagar Pawar

Journal:   International Journal of Computational and Experimental Science and Engineering Year: 2025 Vol: 11 (2)
JOURNAL ARTICLE

Security Analysis of Virtualization in Cloud Computing

Deepika SaxenaGeetika MalikNavneet Sharma

Journal:   2018 UBT International Conference Year: 2018
JOURNAL ARTICLE

Research on Virtualization Security Technology in Cloud Computing Environment

Liang Hao

Journal:   Electrical engineering and computer science Year: 2019 Vol: 1 Pages: 60-67
© 2026 ScienceGate Book Chapters — All rights reserved.