Enhancing the Hypervisor as a Second Layer of Authentication
Journal Title: International Journal of engineering Research and Applications - Year 2018, Vol 8, Issue 4
Abstract
Hosting Services Over The Internet Has Become One Of The Most Terms Pervaded The IT World. Cloud Computing Is A General Term Refers To The Platform Of Hardware And Software Being Used To Migrating Computing Resources To A Virtualized Environment. It Enables Users To Consume Resources, Such As A Virtual Machine (VM), Storage, Or Use A Utility From Anywhere. In This Regard, Hypervisor Or Virtualization Is A Program Designed Specifically To Facilitate The Hosting Of Several Different Virtual Machines On A Single Hardware. Being Said That, Hypervisors May Also Provide Additional Attack Vectors As They Are Commonly Supported By A Simple Password Authentication Scheme. Such Scheme Is Entirely Based On Confidentiality And The Strength Of The Password, Which Is Vulnerable To Various Attacks Such As Offline Password Guessing Attack And A Privileged Insider's Attack. In This Paper, A Second Level Of Authentication Process Is Introduced To Provide Further Security Countermeasures For The Hypervisor Management System. Because Of The Maturity Of These Systems In General, It Is Important To Ground Our Approach. To This End, A Model Is Provided That Utilizes The Encryption Technique In Order To Introduce Better Authentication Process For The Existed Multiple Hypervisor Systems With Little Modification.
Authors and Affiliations
Mohammed Ali Kamoona, Ahmad Mousa Altamimi
Fine-Tuning Of the Suspension System of Baja ATV
As defined by the American National Standards Institute (ANSI), All-Terrain Vehicle is a vehicle that travels on low-pressure tires and designed to handle a wider variety of terrain. Since it is made to run on different...
Fault Detection and Efficiency Analysis of Bottle Filling Plant
Fault detection plays an important role in high cost and safety-critical processes. Early detection of process faults can help avoid abnormal event progression. Fault detection can be accomplished through various means....
Re-Engineering Complex Process Control Systems Using SubProcess Agents.
A process control systems design method whose architecture incorporates the use of agents, process agents and subprocess agents to further reduce the complexity of the system was developed. This is an improvement on an e...
Pyramidal Sum Labeling In Graphs
Let G = (V, E) be a graph with p vertices and q edges. A graph G is said to admit Pyramidal Sum labeling if its vertices can be labeled by nonnegative integers 0,1,2 … 𝑝𝑞 such that the induced edge labels obtained by the...
A Review On Fatigue And Creep Behaviour Of Aluminium Composites
A composite material is a material framework made out of a reasonably organized blend or mix of at least two nano, small scale, or large scale constituents with an interface isolating them that vary in synthetic synthesi...