Journal of Computer Sciences and Applications
ISSN (Print): 2328-7268 ISSN (Online): 2328-725X Website: Editor-in-chief: Minhua Ma, Patricia Goncalves
Open Access
Journal Browser
Journal of Computer Sciences and Applications. 2014, 2(3), 40-43
DOI: 10.12691/jcsa-2-3-1
Open AccessReview Article

On the Evolution of Virtualization and Cloud Computing: A Review

Awodele Oludele1, Emmanuel C. Ogu1, , Kuyoro ‘Shade1 and Umezuruike Chinecherem1

1Department of Computer Science and Information Technology, School of Computing and Engineering Sciences, Babcock University, Ilisan-Remo, Ogun State. Nigeria

Pub. Date: December 25, 2014

Cite this paper:
Awodele Oludele, Emmanuel C. Ogu, Kuyoro ‘Shade and Umezuruike Chinecherem. On the Evolution of Virtualization and Cloud Computing: A Review. Journal of Computer Sciences and Applications. 2014; 2(3):40-43. doi: 10.12691/jcsa-2-3-1


Cloud computing, the technology that makes it possible for computing resources to be provisioned to clients / subscribers over long distances, as well as its component technology – virtualization, which makes it possible for multiple guest systems to co-reside on a single host machine and share the computing resources of the host, have both become very popular technologies that have witnessed giant improvements in the 21st century. This is a review paper that presents an overview of the technologies of virtualization and cloud computing, tracing their history and evolution down a timeline to what they have today, and providing pointers to prospects of future advancements to virtualization and cloud computing.

virtualization cloud computing computing resources clients / subscribers

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit


[1]  Ruthfield, S. (1995, September). The Internet's History and Development From Wartime Tool to the Fish-Cam. Crossroads - Special issue on networks, 2(1), pp. 2-4.
[2]  Dennis, M. A. (2012, March 2). Denial of Service Attack (DoS Attack). (Encyclopaedia Britannica Online Academic Edition). Encyclopaedia Britannica. Retrieved January 29, 2014, from
[3]  Murphy, D. M. (February 2010). War is War? The utility of cyberspace operations in the contemporary operational environment. Proceedings of the workshop for the center for strategic leadership (pp. 1-4). Pennsylvania, USA.: U.S. Army War College.
[4]  Arora, R., & Bajaj, K. S. (2013, March). Highly Effective Advanced Technology “HEAT” Re-defining Technology for Hospital Management. International Journal of Management & Behavioural Sciences, Special Edition, 68-73.
[5]  Davies, A. (2004, June). Computational intermediation and the evolution of computation as a commodity. Applied Economics, 36(11: 1131).
[6]  Christopher, S. (1959). Time Sharing in Large Fast Computers. Proceedings of the International Conference on Information processing, UNESCO.2.19, pp. 336-341. UNESCO. Retrieved February 1, 2014.
[7]  IBM. (1970). IBM System/360 Operating System: Conversational Remote Job Entry Concepts and Facilities. International Business Machine (IBM). North Carolina, USA.: IBM Systems Reference Library. Retrieved February 1, 2014, from
[8]  Nikiforakis, N., Joosen, W., & Johns, M. (2011). Abusing Locality in Shared Web Hosting. Proceedings of the Fourth European Workshop on System Security: Article No. 2. Salzburg, Austria: Association for Computing Machinery.
[9]  Urgaonkar , B., Shenoy, P., & Roscoe, T. (2009, February). Resource overbooking and application profiling in a shared Internet hosting platform. ACM Transactions on Internet Technology (TOIT): Article No. 1 , 9(1).
[10]  Bhattiprolu, S., Biederman, E. W., Hallyn, S., & Lezcano, D. (2008, July). Virtual Servers and Checkpoint/Restart in Mainstream. ACM SIGOPS Operating Systems Review - Research and developments in the Linux kernel, 42(5), 104-113.
[11]  Buyya, R., & Bubendorfer, K. (2009). Market-Oriented Grid and Utility Computing. Wiley Publishing.
[12]  Skillsoft. (2013). Cloud Computing Basics. United States of America. Retrieved August 18, 2013.
[13]  Ogu, E. C., Omotunde, A. A., Mensah, Y., & Ogbonna, A. C. (2014). Virtualization and cloud computing: The pathway to business performance enhancement, sustainability and productivity. International Journal of Business and Economics Research, 170-177.
[14]  Mell, P., & Grance, T. (September 2011). The NIST Definition of Cloud Computing. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, United States Department of Commerce. Gaithersburg, MD 20899-8930: National Institute of Standards and Technology. Retrieved January 28, 2014, from
[15]  Gartner AADI Summit. (2009). Cloud Computing as Gartner Sees it. Gartner's Application Architecture, Development & Integration Summit.
[16]  Strømmen-Bakhtiar, A., & Razavi, A. R. (2011). Cloud Computing Business Models. Springer Computer Communications and Networks, 43-60.
[17]  Ryan, S., & Jiangchuan, L. (2012). Understanding the Impact of Denial of Service Attacks on Virtual Machines. Journal of the IEEE.
[18]  Tupakula, U., & Varadharajan, V. (2011). TVDSEC: Trusted Virtual Domain Security. Institute of Electrical and Electronic Engineers (IEEE), 57-63.
[19]  Pearce, M., Zeadally, S., & Hunt, R. (2013, February). Virtualization: Issues, Security Threats, and Solutions. Association for Computing Machinery (ACM) Computing Surveys, Article 17: 1-39.
[20]  Gurav, U., & Shaikh, R. (2010). Virtualization – A key feature of cloud computing. Proceedings of the International Conference and Workshop on Emerging Trends in Technology (ICWET 2010) (pp. 227-229). Mumbai, Maharashtra, India.: Association for Computing Machinery.
[21]  Sangha, H. (2011, March 9). What is CloudBurst. Retrieved February 2, 2014, from CLOUDCREO: Virtual Solutions, Real Benefits:
[22]  CDW Corporation. (2010, January 11). CDW Server Virtualization Life Cycle Report (Medium and Large Businesses). Retrieved from CDW Newsroom:
[23]  Nagaraju, K., & Sridaran, R. (2012, September). A Survey on Security Threats for Cloud Computing. International Journal of Engineering Research & Technology (IJERT), Volume 1(Issue 7), 1-10.
[24]  Morrissey, M. (2014, January 10). The Future of Cloud Computing - Perspecsys. Retrieved from Cloud Data Security, Secure Cloud Data Encryption | Perspecsys:
[25]  Jones, E. (2013). 2013 Future of Cloud Computing Survey Reveals Business Driving Cloud Adoption in Everything as a Service Era; IT Investing Heavily to Catch up and Support Consumers Graduating from Bring Your Own Device (BYOD) to Bring Your Own Cloud (BYOC). Palo Alto, California.: North Bridge Venture Partners. Retrieved May 28, 2014, from
[26]  Chowdhury, K. N., & Boutaba, R. (2009, July). Network virtualization: state of the art and research challenges. IEEE Communications Magazine, 47(7), 20-26.
[27]  Soundararajan, V., & Anderson, J. M. (2010). The impact of management operations on the virtualized datacenter. Proceedings of the 37th annual international symposium on Computer architecture (pp. 326-337`). New York, NY, USA: ACM.
[28]  Miller, K., & Pegah, M. (2007). Virtualization: virtually at the desktop. Proceedings of the 35th annual ACM SIGUCCS fall conference (pp. 255-260). New York, NY, USA: ACM.