Isolate Secure Executing Environment for a Safe Cloud

Provided by: XI'AN HONEY PEACH NETWORK SCIENCE & TECHNOLOGY Co.,Ltd Topic: Cloud Date Added: Aug 2012 Format: PDF
The use of virtualization in cloud computing is becoming more and more popular. Cloud service providers leverage virtualization technology to multiplex hardware resource, consolidate servers, and provide a rounded executing environment to remote cloud users. However, the current executing environment the cloud provides is not trustable. For a user's computing environment faces threats from other malicious cloud users who aim at attacking the whole underlying virtualization software (virtual machine monitor, VMM, or hypervisor). In this paper, the authors make an analysis of the potential threat to a commodity hypervisor, and propose architecture for safe executing environment on hardware-sharing platform.

Find By Topic