Research Article February 2015 © 2014, IJERMT All Rights Reserved Page | 44 International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-4, Issue-2) A Secure Hypervisor-based Technology Create a Secure Cloud Environment Rajesh Bose, Debabrata Sarddar Department of Computer Science & Engineering University of Kalyani Nadia, West Bengal, India Abstract: s one of the most exciting technologies which have matured in the world today, Cloud Computing has emerged as one which has garnered the most appeal as being flexible and scalable. It has been known to reduce both complexity as well as cost of applications. What was once a dream has now manifested itself as a reality embraced by leaders not only in the industry but in research institutions and various organizations in multitude of spheres? Cloud computing is based on virtualization, A technology in itself which is not quite new. However, the security issues which followed virtualization now poses an equal challenge in case of cloud computing. Further, virtualization can offer only limited security capabilities. This, therefore, poses a significant hurdle which needs to be surmounted in order to secure a wide area environment such as the cloud. The development of a resilient and sturdy security system demands that changes be made derived from traditional virtualization architecture. This paper proposes new security architecture in a hypervisor-based virtualization with the sole objective to offer security against malicious attacks. Key words - cloud computing, virtualization, security architecture, hypervisor. I. INTRODUCTION There have been various waves of technology that have swept the base of IT in the current scenario but the one technology that has made a mark in the IT and as well as corporate in sector Virtualization. In recent, many IT users won’t have powerful machines but they are interested in powerful IT services. The answer to this demand li es with application virtualization using cloud computing and virtualization technologies [1, 2, 3]. It is a technique for hiding the physical characteristics of computing resources to simplify the way in which other systems, applications, or end users interact with those resources. Virtualization is very important for cloud computing and as a result brings another benefit that cloud computing is famous for, scalability. Because each virtual server is allocated only enough computing power and storage capacity that the client needs, more virtual servers can be created. But if the needs grow, more power and capacity can be allocated to that server, or lowered if needed. And because clients only pay for how much computing power and capacity they are using, this can be very affordable for most clients. Without virtualization, cloud computing as we know it would not exist or would be in a different form. But such is now only in the realm of speculation as virtualization is really here to make Information Technology more affordable for the world. Virtualization becomes an innovative software usage model that has many benefits as follows. Cost reduction Better hardware utilization Centralized management Minimizing outage during maintenance Faster deployment of new applications. In rest of the paper is organized as follows, in section II we discuss the Virtualization and its types, in section III we discuss threats and attacks in virtualization, in section IV we discuss here related work and in section V we introduce our proposed worked. Section VI contains the proposed algorithm, Section VII contain flowchart and in section VIII we discuss the conclusion part of the paper. II. VIRTUALIZATION AND ITS TYPES Virtualization is an abstraction layer that's breaks the hard connection between the physical hardware and the operating system. A virtual infrastructure is an enterprise wide solution that provides fluid, powerful computing that maximizes resource utilization and cost savings. Virtual machines are the key element to a virtual infrastructure. Virtualization allows us to run multiple virtual machines with heterogeneous operating systems and application to run in isolation, side- by-side on the same physical machine. There are three types of virtualization: Operating System-Based Virtualization, Hypervisor-Based Virtualization and Application-Based Virtualization. They all share a few common traits. The physical server is called the host. The virtual servers are called guests. The virtual servers behave like physical machines. Each system uses a different approach to allocate physical server resources to virtual server needs. The architecture of these approaches is started A