Securing Guest Virtual Machine By Using Software And Hardware Processor

Abstract

With rapid development on cloud computing, securing guest virtual machines (VMs) from malicious user has become critical to provide secure services. Today’s cloud security model is based up on the software based virtualization with protecting of software hypervisor and its ethical administrator with root permission. Proposed system defines combined process of hardware and software based approach for protecting virtual machine even under cynical hypervisor. Hardware-assisted (H-SVM) used between hypervisor and memory by blocking direct modifications. Nested page tables (hardware) for VMs are stored in the protected memory region, which can be processed only by the H-SVM hardware. For any switch in memory allocation for a VM, the hypervisor, at the honored stage, makes a request to H-SVM to update the memory hardware for the virtual machine. If the hypervisor is compromised, it can try to allotment a physical memory page already defined to a virtual machine to the address space of the hypervisor or a malicious virtual machine.

Authors and Affiliations

Shanthi S, Sowmiya. N. D

Keywords

Related Articles

A Review on Maximum Power Point Tracking Algorithms for Photovoltaic Source

Global Warming and energy policies have become a hot topic on the International agenda in the last years. Developed as well Developing countries are trying to reduce their greenhouse gas emission. India, to at least 33...

Finite Element Analysis of Submarine Radome

Submarine receiving wire utilizes Radio Frequency (RF) framework for correspondence .So it is ensured by radome. Radomes are the electromagnetic windows that shield microwave sub-frameworks from the natural impacts. Lo...

Factors Influencing Safety in Construction Project and Behavior Based Safety Management Approach

Construction works all over the world pose serious threat to workers and non-workers. This study investigates the current scenario of labor’s working in construction industry in terms of Health, Safety and Environmental...

Improvement of low energy adaptive cluster hierarchy protocol using information processing for WSN

Wireless Sensor networks (WSNs) are special type of adhoc networks which makes use of sensors (also known as motes) for gathering information. The data collected by each sensor is communicated through the network to a s...

Design and Development of Hybrid Powered Grass Cutter

Fast development about Different high-tail devices Furthermore equipments makes our employments completed agreeable also sophisticated. Those undertaking points during fabricating a grass cutting machine framework which...

Download PDF file
  • EP ID EP21722
  • DOI -
  • Views 237
  • Downloads 4

How To Cite

Shanthi S, Sowmiya. N. D (2016). Securing Guest Virtual Machine By Using Software And Hardware Processor. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(3), -. https://www.europub.co.uk/articles/-A-21722