ARTICLE

Volume 3,Issue 1

Fall 2025

Cite this article
25
Download
27
Citations
184
Views
4 March 2025

Data Center Virtualization and Secure Data Storage Architecture

Yan Zhang1*
Show Less
1 99 Ranch Market, Arcadia 91007, USA
© 2025 by the Author(s). Licensee Whioce Publishing, USA. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution 4.0 International License ( https://creativecommons.org/licenses/by/4.0/ )
Abstract

With the rapid development of data center virtualization, secure data storage has become a crucial issue. This paper aims to explore and design an efficient secure data storage architecture to address the challenges of data security in virtualized environments. The article first analyzes the impact of virtualization technology on data storage security, including data leakage, tampering, and availability issues. Then, this paper proposes a comprehensive secure data storage architecture, which includes data encryption, access control, backup and recovery strategies, and audit and monitoring mechanisms. Through case studies and security performance evaluations, this paper verifies the effectiveness and feasibility of the proposed architecture. Finally, the paper summarizes the research findings and proposes suggestions for future research directions, to provide references for data center managers and policymakers.

Keywords
Data center virtualization
Secure data storage
Encryption technology
Access control
Backup and recovery
Audit and monitoring
Security architecture design
References

1. Jayapandian N, Rahman AMZ, 2017, Secure and Efficient Online Data Storage and Sharing Over Cloud Environment Using Probabilistic with Homomorphic Encryption. Cluster Computing, 20(2): 1561–1573.
2. Cobb C, Sudar S, Reiter N, et al., 2018, Computer Security for Data Collection Technologies. Development and Engineering, 3: 1–11.
3. Irazoqui G, Eisenbarth T, Sunar B, 2015, A Shared Cache Attack That Works Across Cores and Defies VM Sandboxing and Its Application to AES. Security and Privacy (SP), IEEE Symposium, 591–604.

Conflict of interest
The author declares no conflict of interest.
Share
Back to top