Securing Guest Virtual Machine By Using Software And Hardware Processor

Abstract

With rapid development on cloud computing, securing guest virtual machines (VMs) from malicious user has become critical to provide secure services. Today’s cloud security model is based up on the software based virtualization with protecting of software hypervisor and its ethical administrator with root permission. Proposed system defines combined process of hardware and software based approach for protecting virtual machine even under cynical hypervisor. Hardware-assisted (H-SVM) used between hypervisor and memory by blocking direct modifications. Nested page tables (hardware) for VMs are stored in the protected memory region, which can be processed only by the H-SVM hardware. For any switch in memory allocation for a VM, the hypervisor, at the honored stage, makes a request to H-SVM to update the memory hardware for the virtual machine. If the hypervisor is compromised, it can try to allotment a physical memory page already defined to a virtual machine to the address space of the hypervisor or a malicious virtual machine.

Authors and Affiliations

Shanthi S, Sowmiya. N. D

Keywords

Related Articles

Thermal and Mechanical Analysis on Palm Briquettes

Now we are getting more solid municipal and agricultural wastes. If we can utilize these solid wastes into useful energy resources, then the utilization of these resources along with renewable resources may increase the...

QRS Detection and Data Compression Based On Adaptive Algorithm in a Wireless Wearable Sensor.

The paper presents the QRS detection and data compression based on LMS algorithm in a wireless wearable sensor. The proposed method achieves a high sensitivity of 99.64% and positive prediction of 99.81% ECG database. T...

A Review on Secure Routing in Wireless Sensor Networks

Sensor nodes are tiny, low-cost devices equipped with environment sensors and radio for wireless communication. These sensor nodes may constitute the network for monitoring physical phenomena. Such network is called Wir...

Topical Advancements in Various Spline Techniques for Boundary Value Problems

the present paper surveys and reviews papers on numerical solution of different types of boundary value problems by Spline based Technique. Among a number of numerical methods used to solve boundary value problems such...

Secure Data-Deduplication with Dynamic Ownership Management in Cloud Storage

In cloud storage services, de-duplication technology is commonly used to reduce the space requirements of services by eliminating redundant data and storing single copy of them. When multiple users uploads the same data...

Download PDF file
  • EP ID EP21722
  • DOI -
  • Views 186
  • Downloads 4

How To Cite

Shanthi S, Sowmiya. N. D (2016). Securing Guest Virtual Machine By Using Software And Hardware Processor. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(3), -. https://www.europub.co.uk/articles/-A-21722