Hypervisor Security Issues in Cloud Computing: The Need to Mitigate the Risks
Keywords:
Hypervisor, Intrusions, Risks, Cloud ComputingAbstract
A study was undertaken to study the risks and the threats to hypervisor intrusion. Experiments were carried out, and a review of literature was undertaken in order to be able to understand the depths and the methods of threats and intrusion that could cause security breaches in the hypervisor. The results of the experiment showed that in two experiments the results were similar and in the other three similar experiments carried out the results varied. As a result it was clear that there are perceived threats to the hypervisor but there are also possible ways to mitigate the threats as a method of prevention of any type of intrusion into the hypervisor. The hypervisor is the key to shared resources in the cloud computing system