International Journal of Modern Engineering & Management Research | Vol 1 | Issue 3 | October 2013 57 Mukta Bhatele Department of Computer Science & Engineering. Jai Narain College of Technology RGPV, Bhopal (M.P.), [INDIA] Email : mukta_bhatele@rediffmail.com Abstract: This survey paper simply contains the recent developments in the field of Cloud computing. Cloud computing is an adoption and diffusion which are threatened by unresolved security issues that affect both the cloud provider and the cloud user. In particular, carried out a survey over Virtualization and Hypervisor Protection System (VHPS), aimed at guaranteeing increased security to cloud resources. Virtualization and Hypervisor Protection System (VHPS) can be deployed on several cloud solutions and can effectively monitor the integrity of guest and infrastructure components while at the same time being fully transparent to virtual machines and to cloud users. We simply present the survey over VHPS hypervisor security architecture and examine in detail, its mandatory access control architecture. While existing hypervisor security approaches aimed at high assurance have proven useful for high- security environments Virtual Machines (VM). Keywords: Cloud Computing, Virtualization, Hypervisor, DDOS attacks. 1. INTRODUCTION As general-purpose workstation and server-class computer systems increase in available processing power and decrease in cost, it becomes cost-effective to aggregate the functionality of multiple standalone systems onto a single hardware platform. This minimizes costs for system management and maintenance and maximizes system utilization. Virtualization technology, which enables single system hardware to support multiple operating systems, is quickly becoming a commodity. This technology creates multiple virtual machines (VM) out of one real machine and carefully multiplexes multiple virtual resources onto a single real resource. The broad availability and use of virtualization technology is driven by improved hardware support, such as fully virtualizable CPUs and IO-MMU controlling direct memory access to devices, which enables very efficient implementation of virtual machines. Suddenly, multiple operating systems can be efficiently co-located inside virtual machines on a single general-purpose hardware platform. In addition to its availability, the potential impact of virtualization on workload consolidation and load balancing is getting the attention of key industry players. Microsoft has announced that their next generation security architecture NGSCB will be based on virtualized environments and Intel hopes to run home entertainment in virtualized environments, while large companies selling servers have A Survey over Virtualization and Hypervisor International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) Kirti Raj Bhatele Department of Computer Science & Engineering. University Institute of Technology( UIT), RGPV, Bhopal (M.P.), [INDIA] Email : Kirtirajbhatele8@gmail.com Arundhati Arjaria CSE Department. University Institute of Technology( UIT), RGPV, Bhopal (M.P.), [INDIA] Email :Arundhati_arjaria@yahoo.com Akhilesh Pahade CSE Department. University Institute of Technology( UIT), RGPV, Bhopal (M.P.), [INDIA] Email : akhi005@gmail.com