Research Article February
2015
© 2014, IJERMT All Rights Reserved Page | 44
International Journal of
Emerging Research in Management &Technology
ISSN: 2278-9359 (Volume-4, Issue-2)
A Secure Hypervisor-based Technology Create a Secure
Cloud Environment
Rajesh Bose, Debabrata Sarddar
Department of Computer Science & Engineering University of Kalyani
Nadia, West Bengal, India
Abstract:
s one of the most exciting technologies which have matured in the world today, Cloud Computing has
emerged as one which has garnered the most appeal as being flexible and scalable. It has been known to
reduce both complexity as well as cost of applications. What was once a dream has now manifested itself as a
reality embraced by leaders not only in the industry but in research institutions and various organizations in multitude
of spheres? Cloud computing is based on virtualization, A technology in itself which is not quite new. However, the
security issues which followed virtualization now poses an equal challenge in case of cloud computing. Further,
virtualization can offer only limited security capabilities. This, therefore, poses a significant hurdle which needs to be
surmounted in order to secure a wide area environment such as the cloud. The development of a resilient and sturdy
security system demands that changes be made derived from traditional virtualization architecture. This paper
proposes new security architecture in a hypervisor-based virtualization with the sole objective to offer security against
malicious attacks.
Key words - cloud computing, virtualization, security architecture, hypervisor.
I. INTRODUCTION
There have been various waves of technology that have swept the base of IT in the current scenario but the one
technology that has made a mark in the IT and as well as corporate in sector Virtualization. In recent, many IT users
won’t have powerful machines but they are interested in powerful IT services. The answer to this demand li es with
application virtualization using cloud computing and virtualization technologies [1, 2, 3]. It is a technique for hiding the
physical characteristics of computing resources to simplify the way in which other systems, applications, or end users
interact with those resources. Virtualization is very important for cloud computing and as a result brings another benefit
that cloud computing is famous for, scalability. Because each virtual server is allocated only enough computing power
and storage capacity that the client needs, more virtual servers can be created. But if the needs grow, more power and
capacity can be allocated to that server, or lowered if needed. And because clients only pay for how much computing
power and capacity they are using, this can be very affordable for most clients. Without virtualization, cloud computing
as we know it would not exist or would be in a different form. But such is now only in the realm of speculation as
virtualization is really here to make Information Technology more affordable for the world. Virtualization becomes an
innovative software usage model that has many benefits as follows.
• Cost reduction
• Better hardware utilization
• Centralized management
• Minimizing outage during maintenance
• Faster deployment of new applications.
In rest of the paper is organized as follows, in section II we discuss the Virtualization and its types, in section III we
discuss threats and attacks in virtualization, in section IV we discuss here related work and in section V we introduce our
proposed worked. Section VI contains the proposed algorithm, Section VII contain flowchart and in section VIII we
discuss the conclusion part of the paper.
II. VIRTUALIZATION AND ITS TYPES
Virtualization is an abstraction layer that's breaks the hard connection between the physical hardware and the operating
system. A virtual infrastructure is an enterprise wide solution that provides fluid, powerful computing that maximizes
resource utilization and cost savings. Virtual machines are the key element to a virtual infrastructure. Virtualization
allows us to run multiple virtual machines with heterogeneous operating systems and application to run in isolation, side-
by-side on the same physical machine.
There are three types of virtualization: Operating System-Based Virtualization, Hypervisor-Based Virtualization and
Application-Based Virtualization. They all share a few common traits. The physical server is called the host. The virtual
servers are called guests. The virtual servers behave like physical machines. Each system uses a different approach to
allocate physical server resources to virtual server needs. The architecture of these approaches is started
A