Enhancing Cloud Computing Security Using Hardware Virtualization with Secure Hypervisors
Keywords:
cloud computing, security, hardware virtualization, hypervisors, cyber threatsAbstract
As the adoption of cloud computing continues to surge, ensuring robust security measures becomes paramount to safeguard sensitive data and maintain user trust. This paper proposes a novel approach to enhance cloud computing security leveraging hardware virtualization alongside secure hypervisors. Traditional cloud security solutions often rely on software-based defenses, which may be vulnerable to sophisticated cyber threats. By integrating hardware virtualization, which provides isolated execution environments for virtual machines (VMs), and secure hypervisors, capable of enforcing strict access controls and monitoring VM behaviour, this research addresses critical security challenges in cloud environments. The proposed system offers several advantages, including enhanced isolation between VMs, reduced attack surface, and improved detection and mitigation of malicious activities. Furthermore, by leveraging hardware-based security features, the system can protect sensitive workloads even in the presence of compromised software layers. Performance evaluation results demonstrate the efficacy of the proposed approach (HV-XSM) in mitigating various security threats commonly encountered in cloud computing environments. Overall, this research contributes to the advancement of cloud security by leveraging hardware virtualization and secure hypervisors to create a robust defense mechanism against evolving cyber threats.
Downloads
References
Yang, C., Huang, Q., Li, Z., Liu, K., & Hu, F. (2017). Big Data and cloud computing: innovation opportunities and challenges. International Journal of Digital Earth, 10(1), 13-53.
Moura, J., & Hutchison, D. (2016). Review and analysis of networking challenges in cloud computing. Journal of Network and Computer Applications, 60, 113-129.
Bittencourt, L., Immich, R., Sakellariou, R., Fonseca, N., Madeira, E., Curado, M., & Rana, O. (2018). The internet of things, fog and cloud continuum: Integration and challenges. Internet of Things, 3, 134-155.
Bedi, S. K. (2017). Security measures to protect sensitive customer data in cloud computing. Asian Journal of Management, 8(1), 12-18.
Ashok, A., Govindarasu, M., & Wang, J. (2017). Cyber-physical attack-resilient wide-area monitoring, protection, and control for the power grid. Proceedings of the IEEE, 105(7), 1389-1407.
Knodel, O., Genssler, P. R., & Spallek, R. G. (2017, September). Virtualizing reconfigurable hardware to provide scalability in cloud architectures. In International Conference on Advances in Circuits, Electronics and Micro-electronics (CENICS) (pp. 33-38). sn.
Dildar, M. S., Khan, N., Abdullah, J. B., & Khan, A. S. (2017, March). Effective way to defend the hypervisor attacks in cloud computing. In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (pp. 154-159). IEEE.
Saswade, N., Bharadi, V., & Zanzane, Y. (2016). Virtual machine monitoring in cloud computing. Procedia Computer Science, 79, 135-142.
Jin, S., Ahn, J., Seol, J., Cha, S., Huh, J., & Maeng, S. (2015). H-svm: Hardware-assisted secure virtual machines under a vulnerable hypervisor. IEEE Transactions on Computers, 64(10), 2833-2846.
Alouane, M., & El Bakkali, H. (2016, May). Virtualization in cloud computing: NoHype vs HyperWall new approach. In 2016 International conference on electrical and information technologies (ICEIT) (pp. 49-54). IEEE.
Hassan, S. S. M., & Hilles, S. M. (2014). Enhancing Security Concerns in Cloud Computing Virtual Machines:(Case Study on Central Bank of Sudan).
Alouane, M., & El Bakkali, H. (2016, May). Virtualization in Cloud Computing: Existing solutions and new approach. In 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech) (pp. 116-123). IEEE.
Yadav, Y., & Krishna, C. R. (2017). Two-level security framework for virtual machine migration in cloud computing. i-Manager's Journal on Information Technology, 7(1), 34-44.
Molina Zarca, A., Bernal Bernabe, J., Farris, I., Khettab, Y., Taleb, T., & Skarmeta, A. (2018). Enhancing IoT security through network softwarization and virtual security appliances. International Journal of Network Management, 28(5), e2038.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.