Virtualization in Cloud Computing
VerifiedAdded on 2020/03/02
|13
|3336
|39
AI Summary
This assignment delves into the fundamental relationship between virtualization and cloud computing. It examines how virtualization techniques underpin various cloud services, such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). The document explores the advantages of virtualization in cloud environments, including resource efficiency, scalability, and flexibility. Additionally, it discusses challenges associated with virtualization, such as security concerns and performance bottlenecks. Through a comprehensive analysis of these aspects, the assignment highlights the indispensable role of virtualization in shaping the future of cloud computing.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: VIRTUALIZATION AND CLOUD COMPUTING
VIRTUALIZATION AND CLOUD COMPUTING
Name of the Student
Name of the University
Author Note
VIRTUALIZATION AND CLOUD COMPUTING
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2VIRTUALIZATION AND CLOUD COMPUTING
Table of Contents
Introduction................................................................................................................................3
Migration of database.................................................................................................................3
Security to protect critical database on moving to IaaS instance...........................................3
Benefits and Issues result in deployment of security measure...............................................4
Risk associated...........................................................................................................................4
The Database..........................................................................................................................4
The IaaS infrastructure...........................................................................................................5
Communication between the Webb’s and their IaaS Database in cloud...................................5
Webb’s consideration for the use of Cloud backup...............................................................5
Risks and Issues associated with backing up data to the cloud..................................................6
Backing up data to the cloud..................................................................................................6
storage of the data in the cloud..............................................................................................6
Recommend to Webb’s Board to protect access to:...................................................................6
Clear backup and restore infrastructure.....................................................................................6
Conclusion..................................................................................................................................7
Table of Contents
Introduction................................................................................................................................3
Migration of database.................................................................................................................3
Security to protect critical database on moving to IaaS instance...........................................3
Benefits and Issues result in deployment of security measure...............................................4
Risk associated...........................................................................................................................4
The Database..........................................................................................................................4
The IaaS infrastructure...........................................................................................................5
Communication between the Webb’s and their IaaS Database in cloud...................................5
Webb’s consideration for the use of Cloud backup...............................................................5
Risks and Issues associated with backing up data to the cloud..................................................6
Backing up data to the cloud..................................................................................................6
storage of the data in the cloud..............................................................................................6
Recommend to Webb’s Board to protect access to:...................................................................6
Clear backup and restore infrastructure.....................................................................................6
Conclusion..................................................................................................................................7
3VIRTUALIZATION AND CLOUD COMPUTING
Introduction
The Webb store is situated in the state of Australia and in New Zeeland which mainly
consist of selling of a wide range of stuff which is related to food including some speciality
items. The store is trying to implement a new technology which is related to the cloud
computing along with their daily operation of retailing. The store is facing some issue which
is a continuous issue along the complexity of the operation and management of the
application which is related to information. The concept which was furnished by them was
that that technological innovation towards the process of cloud could be directly beneficial
from the point of the organisation as well as from the point of the customers the store retailer
was mainly advised to moving to the cloud computing environment from their traditional
cloud computing infrastructure. The store is planning to close the data centre which is
situated at Auckland and as a result of which moving from the old infrastructure to the new
infrastructure. The main concern of the store is the cost related to the LTO 6 tapes which are
increasing, this is mainly used to provide back up of critical mission data, on the other hand
there is also a concern on the concept of time framework which is needed to complete a full
back up with regards to the database and the data which is termed as critical. The main aim
the report is to provide an increase in the prospective of organisations flexibility and
responsiveness. The store also has a plan of starting a risk and security workshop for the
assessment of the issue which are related to security and the method that can be used in order
to attain the above prospective is the “hybrid cloud”
Migration of database
Taking into consideration the movement of the MS SQL Server 2012 database to an
infrastructure as a service in stance of the cloud computing there can be many consequences
Introduction
The Webb store is situated in the state of Australia and in New Zeeland which mainly
consist of selling of a wide range of stuff which is related to food including some speciality
items. The store is trying to implement a new technology which is related to the cloud
computing along with their daily operation of retailing. The store is facing some issue which
is a continuous issue along the complexity of the operation and management of the
application which is related to information. The concept which was furnished by them was
that that technological innovation towards the process of cloud could be directly beneficial
from the point of the organisation as well as from the point of the customers the store retailer
was mainly advised to moving to the cloud computing environment from their traditional
cloud computing infrastructure. The store is planning to close the data centre which is
situated at Auckland and as a result of which moving from the old infrastructure to the new
infrastructure. The main concern of the store is the cost related to the LTO 6 tapes which are
increasing, this is mainly used to provide back up of critical mission data, on the other hand
there is also a concern on the concept of time framework which is needed to complete a full
back up with regards to the database and the data which is termed as critical. The main aim
the report is to provide an increase in the prospective of organisations flexibility and
responsiveness. The store also has a plan of starting a risk and security workshop for the
assessment of the issue which are related to security and the method that can be used in order
to attain the above prospective is the “hybrid cloud”
Migration of database
Taking into consideration the movement of the MS SQL Server 2012 database to an
infrastructure as a service in stance of the cloud computing there can be many consequences
4VIRTUALIZATION AND CLOUD COMPUTING
regarding the privacy and the security aspect related to the organisation. Hence the section
mainly puts limelight on the impact which is related to the strategy.
Security to protect critical database on moving to IaaS instance
As the concept of the choosing of the cloud for the SQL server, the selection would be
SQL server on the Azure VMs (IaaS) over the MS SQL server 2012 R2 database. The SQL
which is installed are mainly hosted on the cloud which are on the window server 2012 R2
Database that would be running on the Azure which is also called the IaaS (Infrastructure as a
cloud). The SQL servers on the azure virtual machine are mainly optimized in order to
migrate the existing application of the SQL servers where every other SQL server application
versions and editions are very much present. This cloud service mainly allows the hosting of
the multiple database as per the need and is very much compatible with the server of the
SQL. The SQL server or the azure virtual machines (VMs) mainly comes within the category
of the infrastructure as a service (IaaS) that mainly comprise of the facility to run on the SQL
Server inside the peripheral of the virtual machine relating to the cloud. This is mainly based
within the concept of the standardized hardware as similar to the SQL Database which is
owned, maintained and hosted by the Microsoft. Using a SQL server on a virtual machine a
user can either use an existing license or a maintain pay-as-you-go for the SQL Server which
is licensed and already exiting in the framework of the SQL server image. It can be
considered to very much flexible to use in every aspect possible.
The infrastructure as a service mainly comprise of policy which is service oriented.
The concept of the hybrid cloud mainly utilizes both the public cloud as well as the private
that perform very much distinct functions. The implementation of the hybrid cloud is mainly
for the sector which is related to e- commerce websites in the retail store within the
infrastructure of the private cloud. This concept is very much scalable and secure and the
regarding the privacy and the security aspect related to the organisation. Hence the section
mainly puts limelight on the impact which is related to the strategy.
Security to protect critical database on moving to IaaS instance
As the concept of the choosing of the cloud for the SQL server, the selection would be
SQL server on the Azure VMs (IaaS) over the MS SQL server 2012 R2 database. The SQL
which is installed are mainly hosted on the cloud which are on the window server 2012 R2
Database that would be running on the Azure which is also called the IaaS (Infrastructure as a
cloud). The SQL servers on the azure virtual machine are mainly optimized in order to
migrate the existing application of the SQL servers where every other SQL server application
versions and editions are very much present. This cloud service mainly allows the hosting of
the multiple database as per the need and is very much compatible with the server of the
SQL. The SQL server or the azure virtual machines (VMs) mainly comes within the category
of the infrastructure as a service (IaaS) that mainly comprise of the facility to run on the SQL
Server inside the peripheral of the virtual machine relating to the cloud. This is mainly based
within the concept of the standardized hardware as similar to the SQL Database which is
owned, maintained and hosted by the Microsoft. Using a SQL server on a virtual machine a
user can either use an existing license or a maintain pay-as-you-go for the SQL Server which
is licensed and already exiting in the framework of the SQL server image. It can be
considered to very much flexible to use in every aspect possible.
The infrastructure as a service mainly comprise of policy which is service oriented.
The concept of the hybrid cloud mainly utilizes both the public cloud as well as the private
that perform very much distinct functions. The implementation of the hybrid cloud is mainly
for the sector which is related to e- commerce websites in the retail store within the
infrastructure of the private cloud. This concept is very much scalable and secure and the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
5VIRTUALIZATION AND CLOUD COMPUTING
concept of the brochure website has the public cloud implementation which is very much on
the part of the cost effective service (Drutskoy, Keller & Rexford, 2013).
Benefits and Issues result in deployment of security measure
The possible benefits which are related to the security measure in the cloud migration are:
Reduce the overall concept which is applied to increasing the traffic which may result in
difficulty in the scaling of the resources.
Operation cost reduction with the effectiveness increase of the information technology
resources.
Application implementation should be higher and the deployment done the customer
should also be done.
Business expansion is helped
Over the problem it is helped strategically which is faced regarding the over growth of the
concept of the storage
Helps in building of the distributed widely development team. Allowing the remote
locatable employees in the cloud computing environment in order to access the
application via the concept of the internet (Bruneo, 2014).
On the other hand, there are also several securities issue which are related to the retail store.
Data leakage protection and usage protection
Authorization and authentication
Hardening of the infrastructure
End to end reporting and logging
Encryption which is end to end
concept of the brochure website has the public cloud implementation which is very much on
the part of the cost effective service (Drutskoy, Keller & Rexford, 2013).
Benefits and Issues result in deployment of security measure
The possible benefits which are related to the security measure in the cloud migration are:
Reduce the overall concept which is applied to increasing the traffic which may result in
difficulty in the scaling of the resources.
Operation cost reduction with the effectiveness increase of the information technology
resources.
Application implementation should be higher and the deployment done the customer
should also be done.
Business expansion is helped
Over the problem it is helped strategically which is faced regarding the over growth of the
concept of the storage
Helps in building of the distributed widely development team. Allowing the remote
locatable employees in the cloud computing environment in order to access the
application via the concept of the internet (Bruneo, 2014).
On the other hand, there are also several securities issue which are related to the retail store.
Data leakage protection and usage protection
Authorization and authentication
Hardening of the infrastructure
End to end reporting and logging
Encryption which is end to end
6VIRTUALIZATION AND CLOUD COMPUTING
Risk associated
The drawbacks and the risk associated with the migration for the database to the cloud
cannot be ignored. especially the risk which are associated database, IaaS communication and
the infrastructure between the Webb’s and their IaaS database into the cloud.
The Database
Data Loss Risk: Amid the relocation process of the information, information misfortune can
very much happen. At the point where the information is relocated to the framework which is
new or the can be considered as target framework. In this portion of the information it may or
may not come from the source framework. This hazard can be dodged by means of directing
information relocation testing (Hu & Kaabouch, 2014).
Target application parameterization risk: The parametrization risk may always relate to the
target application. If restrictions are taken into consideration the target system can very much
become incompatible within the program for data migration, this may lead to the potential
error which is introduced into the system. migration of the data can be considered to a great
process in order to combat the risk which is associated with the concept.
The IaaS infrastructure
Semantic risk: Semantic error can very much occur at any time if the migration process of the
data is also done efficiently. For example: the data source of one of the field can be migrated
to different columns or field in the system which is the target system.
Extended downtime risk: This factor is mainly encountered when the migration of the data
takes way more time than expected. The system which is the source system does not get
active and hence the potential risk which is associated for the stakeholders and the
organization.
Risk associated
The drawbacks and the risk associated with the migration for the database to the cloud
cannot be ignored. especially the risk which are associated database, IaaS communication and
the infrastructure between the Webb’s and their IaaS database into the cloud.
The Database
Data Loss Risk: Amid the relocation process of the information, information misfortune can
very much happen. At the point where the information is relocated to the framework which is
new or the can be considered as target framework. In this portion of the information it may or
may not come from the source framework. This hazard can be dodged by means of directing
information relocation testing (Hu & Kaabouch, 2014).
Target application parameterization risk: The parametrization risk may always relate to the
target application. If restrictions are taken into consideration the target system can very much
become incompatible within the program for data migration, this may lead to the potential
error which is introduced into the system. migration of the data can be considered to a great
process in order to combat the risk which is associated with the concept.
The IaaS infrastructure
Semantic risk: Semantic error can very much occur at any time if the migration process of the
data is also done efficiently. For example: the data source of one of the field can be migrated
to different columns or field in the system which is the target system.
Extended downtime risk: This factor is mainly encountered when the migration of the data
takes way more time than expected. The system which is the source system does not get
active and hence the potential risk which is associated for the stakeholders and the
organization.
7VIRTUALIZATION AND CLOUD COMPUTING
Application Stability Risk: There can be numerous reasons for which the target system ort the
target application gets unstable at many times, it may include the improper development,
improper coding of the new application or the wrong coding with regards to the business in
the system which can be considered as the new system (Kumar & Charu, 2015).
Interference risk: Interference risk can make it very difficult when the stakeholders make the
use of the application when the process of the migration is stimulated. Risk affecting the
operation in the business may occur by means of location and thus making out very much
difficult for the other stakeholders in order to use the table (Malhotra, Agarwal & Jaiswal,
2014).
The Webb store is situated in the state of Australia and in New Zeeland which mainly
consist of selling of a wide range of stuff which is related to food including some specialty
items. The store is trying to implement a new technology which is related to the cloud
computing along with their daily operation of retailing. The store is facing some issue which
is a continuous issue along the complexity of the operation and management of the
application which is related to information. The concept which was furnished by them was
that that technological innovation towards the process of cloud could be directly beneficial
from the point of the organization as well as from the point of the customers the store retailer
was mainly advised to moving to the cloud computing environment from their traditional
cloud computing infrastructure. The store is planning to close the data center which is
situated at Auckland and as a result of which moving from the old infrastructure to the new
infrastructure. The main concern of the store is the cost related to the LTO 6 tapes which are
increasing, this is mainly used to provide back up of critical mission data, on the other hand
there is also a concern on the concept of time framework which is needed to complete a full
back up with regards to the database and the data which is termed as critical. The main aim
the report is to provide an increase in the prospective of organizations flexibility and
Application Stability Risk: There can be numerous reasons for which the target system ort the
target application gets unstable at many times, it may include the improper development,
improper coding of the new application or the wrong coding with regards to the business in
the system which can be considered as the new system (Kumar & Charu, 2015).
Interference risk: Interference risk can make it very difficult when the stakeholders make the
use of the application when the process of the migration is stimulated. Risk affecting the
operation in the business may occur by means of location and thus making out very much
difficult for the other stakeholders in order to use the table (Malhotra, Agarwal & Jaiswal,
2014).
The Webb store is situated in the state of Australia and in New Zeeland which mainly
consist of selling of a wide range of stuff which is related to food including some specialty
items. The store is trying to implement a new technology which is related to the cloud
computing along with their daily operation of retailing. The store is facing some issue which
is a continuous issue along the complexity of the operation and management of the
application which is related to information. The concept which was furnished by them was
that that technological innovation towards the process of cloud could be directly beneficial
from the point of the organization as well as from the point of the customers the store retailer
was mainly advised to moving to the cloud computing environment from their traditional
cloud computing infrastructure. The store is planning to close the data center which is
situated at Auckland and as a result of which moving from the old infrastructure to the new
infrastructure. The main concern of the store is the cost related to the LTO 6 tapes which are
increasing, this is mainly used to provide back up of critical mission data, on the other hand
there is also a concern on the concept of time framework which is needed to complete a full
back up with regards to the database and the data which is termed as critical. The main aim
the report is to provide an increase in the prospective of organizations flexibility and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
8VIRTUALIZATION AND CLOUD COMPUTING
responsiveness. The store also has a plan of starting a risk and security workshop for the
assessment of the issue which are related to security and the method that can be used in order
to attain the above prospective is the “hybrid cloud” system (Peng, Nejabati & Simeonidou,
2013).
Communication between the Webb’s and their IaaS Database in cloud
The IaaS provides mainly provide the options which are related to the development
with regards to multiple platforms like the browser, mobile platform and so on.
Webb’s consideration for the use of Cloud backup
Generally, the application which is existing mainly require the charge which is minimum
in the cloud s which are implemented by the SQL server in the azure virtual machine.
The Requirement of The rapid development and the examination then scenario in the case
if the buying the SQL server hardware (Rittinghouse & Ransome, 2016).
Risks and Issues associated with backing up data to the cloud
Backing up data to the cloud
There are mainly four risk which are associated with the backup
Security
Lack of standardization
Outage
storage of the data in the cloud
The main risk which are associated with the concepts are
Leakage of data
No control over the data
BYOD (Swathi, Srikanth & Reddy, 2014).
responsiveness. The store also has a plan of starting a risk and security workshop for the
assessment of the issue which are related to security and the method that can be used in order
to attain the above prospective is the “hybrid cloud” system (Peng, Nejabati & Simeonidou,
2013).
Communication between the Webb’s and their IaaS Database in cloud
The IaaS provides mainly provide the options which are related to the development
with regards to multiple platforms like the browser, mobile platform and so on.
Webb’s consideration for the use of Cloud backup
Generally, the application which is existing mainly require the charge which is minimum
in the cloud s which are implemented by the SQL server in the azure virtual machine.
The Requirement of The rapid development and the examination then scenario in the case
if the buying the SQL server hardware (Rittinghouse & Ransome, 2016).
Risks and Issues associated with backing up data to the cloud
Backing up data to the cloud
There are mainly four risk which are associated with the backup
Security
Lack of standardization
Outage
storage of the data in the cloud
The main risk which are associated with the concepts are
Leakage of data
No control over the data
BYOD (Swathi, Srikanth & Reddy, 2014).
9VIRTUALIZATION AND CLOUD COMPUTING
Recommend to Webb’s Board to protect access to:
Recommendation 1: The IaaS infrastructure – The IaaS cloud providers give the security
preference to the current programing.
Recommendation 2: their MS SQL server 2012 R2 cloud instance – the system is highly
optimized in order to migrate the existence application to the said infrastructure
Clear backup and restore infrastructure
The cloud services use mainly the primary functions which are related to the security
like for the login detail pass codes but the hackers can find way to the access through the
security protocol which is very much easy.
The Webb store is situated in the state of Australia and in New Zeeland which mainly
consist of selling of a wide range of stuff which is related to food including some speciality
items. The store is trying to implement a new technology which is related to the cloud
computing along with their daily operation of retailing. The store is facing some issue which
is a continuous issue along the complexity of the operation and management of the
application which is related to information. The concept which was furnished by them was
that that technological innovation towards the process of cloud could be directly beneficial
from the point of the organisation as well as from the point of the customers the store retailer
was mainly advised to moving to the cloud computing environment from their traditional
cloud computing infrastructure. The store is planning to close the data centre which is
situated at Auckland and as a result of which moving from the old infrastructure to the new
infrastructure. The main concern of the store is the cost related to the LTO 6 tapes which are
increasing, this is mainly used to provide back up of critical mission data, on the other hand
there is also a concern on the concept of time framework which is needed to complete a full
back up with regards to the database and the data which is termed as critical. The main aim
Recommend to Webb’s Board to protect access to:
Recommendation 1: The IaaS infrastructure – The IaaS cloud providers give the security
preference to the current programing.
Recommendation 2: their MS SQL server 2012 R2 cloud instance – the system is highly
optimized in order to migrate the existence application to the said infrastructure
Clear backup and restore infrastructure
The cloud services use mainly the primary functions which are related to the security
like for the login detail pass codes but the hackers can find way to the access through the
security protocol which is very much easy.
The Webb store is situated in the state of Australia and in New Zeeland which mainly
consist of selling of a wide range of stuff which is related to food including some speciality
items. The store is trying to implement a new technology which is related to the cloud
computing along with their daily operation of retailing. The store is facing some issue which
is a continuous issue along the complexity of the operation and management of the
application which is related to information. The concept which was furnished by them was
that that technological innovation towards the process of cloud could be directly beneficial
from the point of the organisation as well as from the point of the customers the store retailer
was mainly advised to moving to the cloud computing environment from their traditional
cloud computing infrastructure. The store is planning to close the data centre which is
situated at Auckland and as a result of which moving from the old infrastructure to the new
infrastructure. The main concern of the store is the cost related to the LTO 6 tapes which are
increasing, this is mainly used to provide back up of critical mission data, on the other hand
there is also a concern on the concept of time framework which is needed to complete a full
back up with regards to the database and the data which is termed as critical. The main aim
10VIRTUALIZATION AND CLOUD COMPUTING
the report is to provide an increase in the prospective of organizations flexibility and
responsiveness. The store also has a plan of starting a risk and security workshop for the
assessment of the issue which are related to security and the method that can be used in order
to attain the above prospective is the “hybrid cloud” (Sharma et al., 2016).
Conclusion
The concept of the cloud computing is much more than the concept of the
virtualization. In this case the retail store is bringing into the implementation of the IaaS
model that mainly deploy the models which are private model, private model and hybrid
model. Though the implantation of the IaaS is an organization the security issue should
always be taken care of in any scenario. The security issue that should be taken care of should
be both in the sector of private and well as public sector.
the report is to provide an increase in the prospective of organizations flexibility and
responsiveness. The store also has a plan of starting a risk and security workshop for the
assessment of the issue which are related to security and the method that can be used in order
to attain the above prospective is the “hybrid cloud” (Sharma et al., 2016).
Conclusion
The concept of the cloud computing is much more than the concept of the
virtualization. In this case the retail store is bringing into the implementation of the IaaS
model that mainly deploy the models which are private model, private model and hybrid
model. Though the implantation of the IaaS is an organization the security issue should
always be taken care of in any scenario. The security issue that should be taken care of should
be both in the sector of private and well as public sector.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
11VIRTUALIZATION AND CLOUD COMPUTING
References
Banerjee, A., Cho, J., Eide, E., Duerig, J., Nguyen, B., Ricci, R., ... & Wong, G. (2015).
Phantomnet: Research infrastructure for mobile networking, cloud computing and
software-defined networking. GetMobile: Mobile Computing and Communications,
19(2), 28-33.
Bourguiba, M., Haddadou, K., El Korbi, I., & Pujolle, G. (2014). Improving network I/O
virtualization for cloud computing. IEEE Transactions on Parallel and Distributed
Systems, 25(3), 673-681.
Bruneo, D. (2014). A stochastic model to investigate data center performance and QoS in
IaaS cloud computing systems. IEEE Transactions on Parallel and Distributed
Systems, 25(3), 560-569.
Callegati, F., Cerroni, W., Contoli, C., & Santandrea, G. (2014, October). Performance of
Network Virtualization in cloud computing infrastructures: The OpenStack case. In
Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on (pp. 132-
137). IEEE.
Drutskoy, D., Keller, E., & Rexford, J. (2013). Scalable network virtualization in software-
defined networks. IEEE Internet Computing, 17(2), 20-27.
Ferretti, L., Pierazzi, F., Colajanni, M., & Marchetti, M. (2013, August). Security and
confidentiality solutions for public cloud database services. In Proc. Seventh Int’l
Conf. Emerging Security Information, Systems and Technologies.
García-Valls, M., Cucinotta, T., & Lu, C. (2014). Challenges in real-time virtualization and
predictable cloud computing. Journal of Systems Architecture, 60(9), 726-740.
References
Banerjee, A., Cho, J., Eide, E., Duerig, J., Nguyen, B., Ricci, R., ... & Wong, G. (2015).
Phantomnet: Research infrastructure for mobile networking, cloud computing and
software-defined networking. GetMobile: Mobile Computing and Communications,
19(2), 28-33.
Bourguiba, M., Haddadou, K., El Korbi, I., & Pujolle, G. (2014). Improving network I/O
virtualization for cloud computing. IEEE Transactions on Parallel and Distributed
Systems, 25(3), 673-681.
Bruneo, D. (2014). A stochastic model to investigate data center performance and QoS in
IaaS cloud computing systems. IEEE Transactions on Parallel and Distributed
Systems, 25(3), 560-569.
Callegati, F., Cerroni, W., Contoli, C., & Santandrea, G. (2014, October). Performance of
Network Virtualization in cloud computing infrastructures: The OpenStack case. In
Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on (pp. 132-
137). IEEE.
Drutskoy, D., Keller, E., & Rexford, J. (2013). Scalable network virtualization in software-
defined networks. IEEE Internet Computing, 17(2), 20-27.
Ferretti, L., Pierazzi, F., Colajanni, M., & Marchetti, M. (2013, August). Security and
confidentiality solutions for public cloud database services. In Proc. Seventh Int’l
Conf. Emerging Security Information, Systems and Technologies.
García-Valls, M., Cucinotta, T., & Lu, C. (2014). Challenges in real-time virtualization and
predictable cloud computing. Journal of Systems Architecture, 60(9), 726-740.
12VIRTUALIZATION AND CLOUD COMPUTING
Guide, P. (2013). Virtualization and Cloud Computing. online] http://www. intel.
com/content/dam/www/public/us/en/documents/guides/cloud-
computingvirtualization-building-private-iaas-guide. pdf (accessed February 2015).
Hu, W. C., & Kaabouch, N. (2014). Big data management, technologies, and applications.
Information Science Reference.
Jain, R., & Paul, S. (2013). Network virtualization and software defined networking for cloud
computing: a survey. IEEE Communications Magazine, 51(11), 24-31.
Kumar, R., & Charu, S. (2015). An importance of using virtualization technology in cloud
computing. Global Journal of Computers & Technology, 1(2).
Lin, J. W., Chen, C. H., & Lin, C. Y. (2014). Integrating QoS awareness with virtualization in
cloud computing systems for delay-sensitive applications. Future Generation
Computer Systems, 37, 478-487.
Malhotra, L., Agarwal, D., & Jaiswal, A. (2014). Virtualization in cloud computing. J.
Inform. Tech. Softw. Eng, 4(2).
Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service
(IaaS) in cloud computing: A survey. Journal of Network and Computer Applications,
41, 424-440.
Peng, S., Nejabati, R., & Simeonidou, D. (2013). Role of optical network virtualization in
cloud computing. Journal of Optical Communications and Networking, 5(10), A162-
A170.
Rankothge, W., Ma, J., Le, F., Russo, A., & Lobo, J. (2015, May). Towards making network
function virtualization a cloud computing service. In Integrated Network Management
(IM), 2015 IFIP/IEEE International Symposium on (pp. 89-97). IEEE.
Guide, P. (2013). Virtualization and Cloud Computing. online] http://www. intel.
com/content/dam/www/public/us/en/documents/guides/cloud-
computingvirtualization-building-private-iaas-guide. pdf (accessed February 2015).
Hu, W. C., & Kaabouch, N. (2014). Big data management, technologies, and applications.
Information Science Reference.
Jain, R., & Paul, S. (2013). Network virtualization and software defined networking for cloud
computing: a survey. IEEE Communications Magazine, 51(11), 24-31.
Kumar, R., & Charu, S. (2015). An importance of using virtualization technology in cloud
computing. Global Journal of Computers & Technology, 1(2).
Lin, J. W., Chen, C. H., & Lin, C. Y. (2014). Integrating QoS awareness with virtualization in
cloud computing systems for delay-sensitive applications. Future Generation
Computer Systems, 37, 478-487.
Malhotra, L., Agarwal, D., & Jaiswal, A. (2014). Virtualization in cloud computing. J.
Inform. Tech. Softw. Eng, 4(2).
Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service
(IaaS) in cloud computing: A survey. Journal of Network and Computer Applications,
41, 424-440.
Peng, S., Nejabati, R., & Simeonidou, D. (2013). Role of optical network virtualization in
cloud computing. Journal of Optical Communications and Networking, 5(10), A162-
A170.
Rankothge, W., Ma, J., Le, F., Russo, A., & Lobo, J. (2015, May). Towards making network
function virtualization a cloud computing service. In Integrated Network Management
(IM), 2015 IFIP/IEEE International Symposium on (pp. 89-97). IEEE.
13VIRTUALIZATION AND CLOUD COMPUTING
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. CRC press.
Sharma, G. P., Singh, S., Singh, A., & Kaur, R. (2016). Virtualization in Cloud Computing.
Swathi, T., Srikanth, K., & Reddy, S. R. (2014). Virtualization in cloud computing.
International Journal of Computer Science and Mobile Computing, 3(5), 540-546.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing
and internet of things-based cloud manufacturing service system. IEEE Transactions
on Industrial Informatics, 10(2), 1435-1442.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. CRC press.
Sharma, G. P., Singh, S., Singh, A., & Kaur, R. (2016). Virtualization in Cloud Computing.
Swathi, T., Srikanth, K., & Reddy, S. R. (2014). Virtualization in cloud computing.
International Journal of Computer Science and Mobile Computing, 3(5), 540-546.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing
and internet of things-based cloud manufacturing service system. IEEE Transactions
on Industrial Informatics, 10(2), 1435-1442.
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.