Enhancing Data Integrity in Public Cloud Environments by controlling Intruder Attacks using Hypervisor

  • Dr. T. K. Shaik Shavali


Due to present day emerging trends in technology which increases application utility creates a demand on the storage of huge data volume that leads to crucial necessity e of cloud computing especially in data as a service. When data is considered as a primary element we may need to emphasize on trustability and privacy preservation over high sensitive contributor's data that needs to get deposited in the cloud Store and kept ready for service towards the the consumption of cloud data user with an appropriate security regulations framed and controlled by Cloud Service Provider. With the rapid grown in cloud related technologies, many people have started leasing data to the clouds due to the numerous advantages that it offers like pay as per usage and scalability of resources on need basis. These features of cloud have immensely profited small and medium scale businesses. But the cloud administrators must provide security and privacy for the users using their cloud services. They have to give protection against cyber- attacks. Insider attack is one such attack where cloud administrators themselves try to steal data and gain ownership of the resources. Such kinds of activities disturb the confidentiality and integrity of the organization. In this project we try to address such internal abnormalities in the cloud infrastructure by monitoring the hypervisors. The hypervisors are responsible for maintaining the data confidentiality and integrity of the system where the operating system and memory allocation on remote virtual desktops is not trustable. We examine two hypervisors - Trust visor and Flicker that isolate the information and provide only required access to authorized people. We propose to develop a prototype which shows how the security could be provided on untrusted cloud environments.

How to Cite
Dr. T. K. Shaik Shavali. (2020). Enhancing Data Integrity in Public Cloud Environments by controlling Intruder Attacks using Hypervisor. International Journal of Advanced Science and Technology, 29(04), 11576-11590. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/36050