Virtualization Is Inherently More Secure Cloud Computing

Additionally, with hypervisors such as Xen, guest operating systems run in a lessprivileged Ring 1 and applications in the least-privileged Ring. This explicit virtualization of the physical resources leads to a clear separation between guest and hypervisor, resulting in additional security separation between the two. Different instances running on the same physical machine are isolated from each other via the hypervisor.

All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd Protection Status

Cloud Computing Topics