1 INTRODUCTION
Virtual machine technology provides strong isolation and better monitoring capability at the virtual machine monitor level. Once attacks happen, though it is possible, it is hard for the attacker to break into the virtual machine monitor to compromise other virtual machines or avoid being monitored. Therefore, virtual machine technology is widely used in cloud computing and data centers as a preliminary approach in various service architectures.