Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet while providing the privacy and security. Using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open-source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, "virtualization" is one of the techniques dividing memory into different blocks. In most of the existing systems, there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: (1) allotting the VM security monitor model for each virtual machine and (2) providing secret keys to encrypt and decrypt information by symmetric encryption. The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model.
Keywords:Cloud computing, Authentication, Encryption, Confidentiality, Virtualization.
INTRODUCTIONDistributed systems as an area of research have seen a high growing progress for the past few years, driven by the use of new use cases to technical improvements. Cloud computing [1] is one such a famous model that has progressed from the adopting of utility computing, service oriented architectures, and virtualization. In other words, cloud is a storage remote location. Cloud can provide the services over private or public networks, i.e., local area network, metropolitan area network, wide area network, and virtual private network. Cloud computing refers to manipulating, accessing, and configuring the software and hardware resources remotely. Cloud computing is featured by those users who can easily utilize the platforms [2], for example, operating systems and middleware services, infrastructure, for example, networks, servers, and storages, and software's. In cloud computing service environments, two users play vital role: Cloud service providers and cloud users or consumers. One side, cloud provider maintains the huge computing services in their large server centers [2] to cloud users on the rent-usage basis. On the other side, there are cloud consumers use services from cloud owner to deploy their applications. First, a consumer will check the services, those services are suitable for their applications, and then, consumer sends a request for services to a cloud owner. When the cloud owner receives the user requests, will assign the required resources to the user as a cast of guest virtual machines (VMs) [3]. Then, the c...