Pages

Tuesday, March 15, 2011

Security in Cloud computing: Risk Prevention In VMM

VMM Should support following properties:

Isolation :Software running in a virtual machine cannot access or modify the software running in the VMM or in a separate VM.
Inspection: The VMM has access to all the state of a virtual machine: CPU state (e.g. registers), all memory, and all I/O device state such as the contents of storage devices and register state of I/O controllers. So that VMM can monitor VM.
Interposition: Fundamentally, VMMs need to interpose on certain virtual machine operations (e.g. executing privileged instructions). For ex. if the code running in the VM attempts to modify a given register.

No comments:

Post a Comment