Cloud

Isolate Secure Executing Environment for a Safe Cloud

Download Now Free registration required

Executive Summary

The use of virtualization in cloud computing is becoming more and more popular. Cloud service providers leverage virtualization technology to multiplex hardware resource, consolidate servers, and provide a rounded executing environment to remote cloud users. However, the current executing environment the cloud provides is not trustable. For a user's computing environment faces threats from other malicious cloud users who aim at attacking the whole underlying virtualization software (virtual machine monitor, VMM, or hypervisor). In this paper, the authors make an analysis of the potential threat to a commodity hypervisor, and propose architecture for safe executing environment on hardware-sharing platform.

  • Format: PDF
  • Size: 415.1 KB