Enhancing Cloud Computing Security Using Hardware Virtualization with Secure Hypervisors

Authors

  • Zareena Sulthana

Keywords:

cloud computing, security, hardware virtualization, hypervisors, cyber threats

Abstract

As the adoption of cloud computing continues to surge, ensuring robust security measures becomes paramount to safeguard sensitive data and maintain user trust. This paper proposes a novel approach to enhance cloud computing security leveraging hardware virtualization alongside secure hypervisors. Traditional cloud security solutions often rely on software-based defenses, which may be vulnerable to sophisticated cyber threats. By integrating hardware virtualization, which provides isolated execution environments for virtual machines (VMs), and secure hypervisors, capable of enforcing strict access controls and monitoring VM behaviour, this research addresses critical security challenges in cloud environments. The proposed system offers several advantages, including enhanced isolation between VMs, reduced attack surface, and improved detection and mitigation of malicious activities. Furthermore, by leveraging hardware-based security features, the system can protect sensitive workloads even in the presence of compromised software layers. Performance evaluation results demonstrate the efficacy of the proposed approach (HV-XSM) in mitigating various security threats commonly encountered in cloud computing environments. Overall, this research contributes to the advancement of cloud security by leveraging hardware virtualization and secure hypervisors to create a robust defense mechanism against evolving cyber threats.

Downloads

Download data is not yet available.

References

Yang, C., Huang, Q., Li, Z., Liu, K., & Hu, F. (2017). Big Data and cloud computing: innovation opportunities and challenges. International Journal of Digital Earth, 10(1), 13-53.

Moura, J., & Hutchison, D. (2016). Review and analysis of networking challenges in cloud computing. Journal of Network and Computer Applications, 60, 113-129.

Bittencourt, L., Immich, R., Sakellariou, R., Fonseca, N., Madeira, E., Curado, M., & Rana, O. (2018). The internet of things, fog and cloud continuum: Integration and challenges. Internet of Things, 3, 134-155.

Bedi, S. K. (2017). Security measures to protect sensitive customer data in cloud computing. Asian Journal of Management, 8(1), 12-18.

Ashok, A., Govindarasu, M., & Wang, J. (2017). Cyber-physical attack-resilient wide-area monitoring, protection, and control for the power grid. Proceedings of the IEEE, 105(7), 1389-1407.

Knodel, O., Genssler, P. R., & Spallek, R. G. (2017, September). Virtualizing reconfigurable hardware to provide scalability in cloud architectures. In International Conference on Advances in Circuits, Electronics and Micro-electronics (CENICS) (pp. 33-38). sn.

Dildar, M. S., Khan, N., Abdullah, J. B., & Khan, A. S. (2017, March). Effective way to defend the hypervisor attacks in cloud computing. In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (pp. 154-159). IEEE.

Saswade, N., Bharadi, V., & Zanzane, Y. (2016). Virtual machine monitoring in cloud computing. Procedia Computer Science, 79, 135-142.

Jin, S., Ahn, J., Seol, J., Cha, S., Huh, J., & Maeng, S. (2015). H-svm: Hardware-assisted secure virtual machines under a vulnerable hypervisor. IEEE Transactions on Computers, 64(10), 2833-2846.

Alouane, M., & El Bakkali, H. (2016, May). Virtualization in cloud computing: NoHype vs HyperWall new approach. In 2016 International conference on electrical and information technologies (ICEIT) (pp. 49-54). IEEE.

Hassan, S. S. M., & Hilles, S. M. (2014). Enhancing Security Concerns in Cloud Computing Virtual Machines:(Case Study on Central Bank of Sudan).

Alouane, M., & El Bakkali, H. (2016, May). Virtualization in Cloud Computing: Existing solutions and new approach. In 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech) (pp. 116-123). IEEE.

Yadav, Y., & Krishna, C. R. (2017). Two-level security framework for virtual machine migration in cloud computing. i-Manager's Journal on Information Technology, 7(1), 34-44.

Molina Zarca, A., Bernal Bernabe, J., Farris, I., Khettab, Y., Taleb, T., & Skarmeta, A. (2018). Enhancing IoT security through network softwarization and virtual security appliances. International Journal of Network Management, 28(5), e2038.

Downloads

Published

26.06.2020

How to Cite

Sulthana, Z. . (2020). Enhancing Cloud Computing Security Using Hardware Virtualization with Secure Hypervisors. International Journal of Intelligent Systems and Applications in Engineering, 8(2), 121–127. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6024

Issue

Section

Research Article