Securing Guest Virtual Machine By Using Software And Hardware Processor
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
With rapid development on cloud computing, securing guest virtual machines (VMs) from malicious user has become critical to provide secure services. Today’s cloud security model is based up on the software based virtualization with protecting of software hypervisor and its ethical administrator with root permission. Proposed system defines combined process of hardware and software based approach for protecting virtual machine even under cynical hypervisor. Hardware-assisted (H-SVM) used between hypervisor and memory by blocking direct modifications. Nested page tables (hardware) for VMs are stored in the protected memory region, which can be processed only by the H-SVM hardware. For any switch in memory allocation for a VM, the hypervisor, at the honored stage, makes a request to H-SVM to update the memory hardware for the virtual machine. If the hypervisor is compromised, it can try to allotment a physical memory page already defined to a virtual machine to the address space of the hypervisor or a malicious virtual machine.
Authors and Affiliations
Shanthi S, Sowmiya. N. D
Improving Security of Network Services against WSDL Threats
WSDL documents are the guide book for attacking and hacking the web services. Since a WSDL documents contains explicit instructions on how to communicate private application, they can cause a series security breach if t...
Compressor-Less Refrigerator cum Oven
The impact of on-going progress in Science and Technology has created a variety of systems that can be used in the generation of power from Renewable Sources of energy and one of these is Solar Energy. The project which...
Wireless Electronic Notice Board Using GSM Technology
With the advancing technology nowadays, the wireless communication is proving its importance in each and every field of today’s era. This paper deals with use of one such wireless technology GSM for controlling electron...
Network Security Attacks Solution and Analysis
Network security is that the composition of the vital policies and managed criteria adopted by an individual for the interference of unauthorized access, modification network-accessible resources network security plays...
Data Integrity Proofs in Cloud Storage
Cloud computing has been envisioned as the de-facto solution to the rising storage costs of IT Enterprises. With the high costs of data storage devices as well as the rapid rate at which data is being generated it prove...