{"id":"https://openalex.org/W2511432830","doi":"https://doi.org/10.1145/2905055.2905315","title":"Security Challenges of Virtualization in Cloud Computing","display_name":"Security Challenges of Virtualization in Cloud Computing","publication_year":2016,"publication_date":"2016-03-04","ids":{"openalex":"https://openalex.org/W2511432830","doi":"https://doi.org/10.1145/2905055.2905315","mag":"2511432830"},"language":"en","primary_location":{"id":"doi:10.1145/2905055.2905315","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905315","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018358369","display_name":"Manjeet Gupta","orcid":null},"institutions":[{"id":"https://openalex.org/I201750527","display_name":"Uttarakhand Technical University","ror":"https://ror.org/03ms8m606","country_code":"IN","type":"education","lineage":["https://openalex.org/I201750527"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Manjeet Gupta","raw_affiliation_strings":["Uttarakhand Technical University, Dehradun"],"affiliations":[{"raw_affiliation_string":"Uttarakhand Technical University, Dehradun","institution_ids":["https://openalex.org/I201750527"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038205506","display_name":"Devesh Kumar Srivastava","orcid":"https://orcid.org/0000-0002-7400-8641"},"institutions":[{"id":"https://openalex.org/I164861460","display_name":"Manipal Academy of Higher Education","ror":"https://ror.org/02xzytt36","country_code":"IN","type":"education","lineage":["https://openalex.org/I164861460"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Devesh Kumar Srivastava","raw_affiliation_strings":["Manipal University, Jaipur"],"affiliations":[{"raw_affiliation_string":"Manipal University, Jaipur","institution_ids":["https://openalex.org/I164861460"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101659805","display_name":"Durg Singh Chauhan","orcid":"https://orcid.org/0000-0002-9076-0665"},"institutions":[{"id":"https://openalex.org/I82571370","display_name":"GLA University","ror":"https://ror.org/05fnxgv12","country_code":"IN","type":"education","lineage":["https://openalex.org/I82571370"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Durg Singh Chauhan","raw_affiliation_strings":["G.L.A University, Mathura"],"affiliations":[{"raw_affiliation_string":"G.L.A University, Mathura","institution_ids":["https://openalex.org/I82571370"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018358369"],"corresponding_institution_ids":["https://openalex.org/I201750527"],"apc_list":null,"apc_paid":null,"fwci":1.3609,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.86459643,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.9031455516815186},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8343212008476257},{"id":"https://openalex.org/keywords/full-virtualization","display_name":"Full virtualization","score":0.8089656233787537},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8033190965652466},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.7726209759712219},{"id":"https://openalex.org/keywords/hardware-virtualization","display_name":"Hardware virtualization","score":0.7293460369110107},{"id":"https://openalex.org/keywords/application-virtualization","display_name":"Application virtualization","score":0.6602786779403687},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.6320719122886658},{"id":"https://openalex.org/keywords/service-virtualization","display_name":"Service virtualization","score":0.6070966720581055},{"id":"https://openalex.org/keywords/temporal-isolation-among-virtual-machines","display_name":"Temporal isolation among virtual machines","score":0.6051746010780334},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.545689582824707},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5443063378334045},{"id":"https://openalex.org/keywords/utility-computing","display_name":"Utility computing","score":0.44256263971328735},{"id":"https://openalex.org/keywords/data-virtualization","display_name":"Data virtualization","score":0.4229829013347626},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4133397936820984},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3905312418937683}],"concepts":[{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.9031455516815186},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8343212008476257},{"id":"https://openalex.org/C47878483","wikidata":"https://www.wikidata.org/wiki/Q848333","display_name":"Full virtualization","level":4,"score":0.8089656233787537},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8033190965652466},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.7726209759712219},{"id":"https://openalex.org/C68793194","wikidata":"https://www.wikidata.org/wiki/Q1616095","display_name":"Hardware virtualization","level":5,"score":0.7293460369110107},{"id":"https://openalex.org/C13062989","wikidata":"https://www.wikidata.org/wiki/Q651531","display_name":"Application virtualization","level":5,"score":0.6602786779403687},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.6320719122886658},{"id":"https://openalex.org/C22502294","wikidata":"https://www.wikidata.org/wiki/Q17149844","display_name":"Service virtualization","level":5,"score":0.6070966720581055},{"id":"https://openalex.org/C142355369","wikidata":"https://www.wikidata.org/wiki/Q7698919","display_name":"Temporal isolation among virtual machines","level":4,"score":0.6051746010780334},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.545689582824707},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5443063378334045},{"id":"https://openalex.org/C85106507","wikidata":"https://www.wikidata.org/wiki/Q1188445","display_name":"Utility computing","level":4,"score":0.44256263971328735},{"id":"https://openalex.org/C80344994","wikidata":"https://www.wikidata.org/wiki/Q5227369","display_name":"Data virtualization","level":4,"score":0.4229829013347626},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4133397936820984},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3905312418937683},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2905055.2905315","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905315","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W200508531","https://openalex.org/W1527803585","https://openalex.org/W1992913810","https://openalex.org/W2112967367","https://openalex.org/W2160286502","https://openalex.org/W2162840341","https://openalex.org/W2209768828","https://openalex.org/W4232931688"],"related_works":["https://openalex.org/W2134071009","https://openalex.org/W633976324","https://openalex.org/W190436017","https://openalex.org/W2189348126","https://openalex.org/W2021257679","https://openalex.org/W137788609","https://openalex.org/W2941645671","https://openalex.org/W3173633118","https://openalex.org/W655266907","https://openalex.org/W2352195790"],"abstract_inverted_index":{"Recent":[0],"years":[1],"have":[2],"been":[3],"advanced":[4],"in":[5,29,92,121],"cloud":[6,11,39],"computing":[7,12,30,48],"technology.":[8],"Virtualization":[9,62,76],"supports":[10],"to":[13,17,37,53,55,107],"virtualize":[14],"the":[15,38,50,57,64,78,117],"resources":[16,40,58],"provide":[18],"software-as-a-service,":[19],"infrastructure-as-a-service":[20],"and":[21,35,74,102],"platform-as-a-service":[22],"mainly.":[23],"Many":[24],"Virtual":[25,45,86,96],"Machines":[26],"are":[27,90],"used":[28],"which":[31,88],"gives":[32,63,77],"flexibility,":[33],"agility":[34],"scalability":[36],"that":[41],"allow":[42],"manipulating":[43],"their":[44],"Machines.":[46],"Virtualized":[47],"provides":[49],"virtual":[51],"machines":[52,89],"client":[54],"access":[56,84],"at":[59],"remote":[60],"locations.":[61],"features":[65,79],"of":[66,80,85,116],"resource":[67],"utilization,":[68],"isolation":[69],"among":[70],"hardware,":[71],"operating":[72],"system":[73],"software.":[75],"multitenancy":[81],"for":[82],"simultaneously":[83],"Machines,":[87],"allocated":[91],"single":[93],"physical":[94],"machine.":[95],"machine":[97],"can":[98],"be":[99],"created,":[100],"copied":[101],"migrated.":[103],"This":[104,110],"flexibility":[105],"leads":[106],"security":[108,119],"challenges.":[109],"paper":[111],"presents":[112],"an":[113],"analysis":[114],"report":[115],"current":[118],"vulnerabilities":[120],"virtualization.":[122]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
