Enhancing the Hypervisor as a Second Layer of Authentication

Abstract

Hosting Services Over The Internet Has Become One Of The Most Terms Pervaded The IT World. Cloud Computing Is A General Term Refers To The Platform Of Hardware And Software Being Used To Migrating Computing Resources To A Virtualized Environment. It Enables Users To Consume Resources, Such As A Virtual Machine (VM), Storage, Or Use A Utility From Anywhere. In This Regard, Hypervisor Or Virtualization Is A Program Designed Specifically To Facilitate The Hosting Of Several Different Virtual Machines On A Single Hardware. Being Said That, Hypervisors May Also Provide Additional Attack Vectors As They Are Commonly Supported By A Simple Password Authentication Scheme. Such Scheme Is Entirely Based On Confidentiality And The Strength Of The Password, Which Is Vulnerable To Various Attacks Such As Offline Password Guessing Attack And A Privileged Insider's Attack. In This Paper, A Second Level Of Authentication Process Is Introduced To Provide Further Security Countermeasures For The Hypervisor Management System. Because Of The Maturity Of These Systems In General, It Is Important To Ground Our Approach. To This End, A Model Is Provided That Utilizes The Encryption Technique In Order To Introduce Better Authentication Process For The Existed Multiple Hypervisor Systems With Little Modification.

Authors and Affiliations

Mohammed Ali Kamoona, Ahmad Mousa Altamimi

Keywords

Related Articles

The Journey of being an Entrepreneur

Entrepreneurs are innovators, willing to take risks and generate new ideas to create unique and potentially profitable solutions to modern-day problems. Entrepreneurship is not so much a skill as a habitual state of mind...

Innovation in coffee post-harvest: development of an automation system for the drying process.

Innovation is one of themost important elements in order to obtain success in any business. In this paper, firstly we will show the importance of innovation and then its application with technological development, based...

Performance Study of Tube Settlers Module

The water treatment plant plays an important role for supplying and purifying potable water. The present study is aimed to emphasize the performance of tube settler unit. A pilot scale model of sedimentation tank is prep...

Performa-nce Prediction of a Jatropha-Biodiesel Powered Gas Turbine Plant

This paper examines the behaviour of a 75MW gas turbine plant fired with Jatropha biodiesel derived from Nigerian feedstock as a possible alternative fuel. The analysis was carried out by varying the ambient temperature...

Direction of Arrival Estimation Based on MUSIC Algorithm Using Uniform and Non-Uniform Linear Arrays

In signal processing, the direction of arrival (DOA) estimation denotes the direction from which a propagating wave arrives at a point, where a set of antennas is located. Using the array antenna has an advantage over th...

Download PDF file
  • EP ID EP393962
  • DOI 10.9790/9622-0804021317.
  • Views 81
  • Downloads 0

How To Cite

Mohammed Ali Kamoona, Ahmad Mousa Altamimi (2018). Enhancing the Hypervisor as a Second Layer of Authentication. International Journal of engineering Research and Applications, 8(4), 13-17. https://europub.co.uk/articles/-A-393962