Securing Guest Virtual Machine By Using Software And Hardware Processor
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
With rapid development on cloud computing, securing guest virtual machines (VMs) from malicious user has become critical to provide secure services. Today’s cloud security model is based up on the software based virtualization with protecting of software hypervisor and its ethical administrator with root permission. Proposed system defines combined process of hardware and software based approach for protecting virtual machine even under cynical hypervisor. Hardware-assisted (H-SVM) used between hypervisor and memory by blocking direct modifications. Nested page tables (hardware) for VMs are stored in the protected memory region, which can be processed only by the H-SVM hardware. For any switch in memory allocation for a VM, the hypervisor, at the honored stage, makes a request to H-SVM to update the memory hardware for the virtual machine. If the hypervisor is compromised, it can try to allotment a physical memory page already defined to a virtual machine to the address space of the hypervisor or a malicious virtual machine.
Authors and Affiliations
Shanthi S, Sowmiya. N. D
A Review on Maximum Power Point Tracking Algorithms for Photovoltaic Source
Global Warming and energy policies have become a hot topic on the International agenda in the last years. Developed as well Developing countries are trying to reduce their greenhouse gas emission. India, to at least 33...
Finite Element Analysis of Submarine Radome
Submarine receiving wire utilizes Radio Frequency (RF) framework for correspondence .So it is ensured by radome. Radomes are the electromagnetic windows that shield microwave sub-frameworks from the natural impacts. Lo...
Factors Influencing Safety in Construction Project and Behavior Based Safety Management Approach
Construction works all over the world pose serious threat to workers and non-workers. This study investigates the current scenario of labor’s working in construction industry in terms of Health, Safety and Environmental...
Improvement of low energy adaptive cluster hierarchy protocol using information processing for WSN
Wireless Sensor networks (WSNs) are special type of adhoc networks which makes use of sensors (also known as motes) for gathering information. The data collected by each sensor is communicated through the network to a s...
Design and Development of Hybrid Powered Grass Cutter
Fast development about Different high-tail devices Furthermore equipments makes our employments completed agreeable also sophisticated. Those undertaking points during fabricating a grass cutting machine framework which...