Date Added: Apr 2011
Cloud computing is an emerging trend in the provision of computing resources. For economical reasons users are outsourcing applications and data storage to the cloud, a managed hardware infrastructure providing various services. As the cloud grows it becomes necessary to secure the data and applications from unwanted attackers. This paper examines a combination of traditional methods for virtualization security and data transfer along with new methods of securing data and virtual machines. With these techniques, a user's cloud applications and data may be secured from unwanted intrusions.