Secure virtualization for cloud environment using guest OS and VMM-based technology

This architecture use multiple work mode for security components in guest level to decrease security process over-head and a security supervisory in hypervisor layer to make sure avoiding from false security alarms. | International Journal of Computer Networks and Communications Security C VOL. 1, NO. 2, JULY 2013, 61–67 Available online at: ISSN 2308-9830 N C S Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Technology Mahda Noura1, Sadra Mohammadalian2, Leila Fathi3, Mahnoosh Torabi4 1234 Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, 43400 UPM Serdang, Selangor E-mail: 1m_noura67@, , 3fathi_leila67@, 4 mahnooshtorabi@ ABSTRACT Cloud computing, the utility base computing, is going to become the mainstream of IT future. Governments and enterprises are realizing that by immigrating into the cloud they can significantly enhance their current infrastructure or application services with minimum cost and maximum elasticity. But securing cloud user digital assets and addressing privacy concerns of cloud costumers has become serious challenge. Providing security in cloud always has to consider performance. Employing high secure methods with massive complexity will increase overall service cost, to address this problem in this paper a two- tier security architecture is proposed. This architecture use multiple work mode for security components in guest level to decrease security process over-head and a security supervisory in hypervisor layer to make sure avoiding from false security alarms. Keywords: Component, Cloud, Security, Secure Sandbox, Cloud Security Architecture. 1 INTRODUCTION Cloud computing is a new model for service based computing which aims to provide ondemand, low-cost, high-performance processing and storage and other computing resources. Cloud computing quick growth brought new generation of security threats and issues in addition to reformed classical security threats in cloud [1]. As a result of the growth of the technology, organizations have two different choices whether using existence technologies which are stable or new .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.