Downloads: 103 | Views: 288
Survey Paper | Information Technology | India | Volume 3 Issue 12, December 2014 | Popularity: 6.4 / 10
A Literature Survey on Virtualization Security Threats in Cloud Computing
Brona Shah, Jignesh Vania
Abstract: Cloud Computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources, (for example networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. But it has many security issues they are Lack of trust, loss of control and multitenency. In cloud computing at IaaS Infrastructure is provided so Virtual machines are running in this level and service has been provided. SO there is one security threat is VM Migration. So for preventing this VM Migration problem one protocol is used so through that protocol this problem become less. At this level different VMs of different users are running on the same physical server. So another problem at this level is risk of co-resident attack, in which user of one VM can get information from the another VM. So for reducing this co-resident Attack different policies are there which perform the best when servers are properly configured but if not then there is a risk of co-resident attack so for reduce the risk of this new policy is there in which Previously selected server First is used that is for allocating the server for user. But still there is problem so that another policy in which one agent is there which checks the user and authenticate them and if there is any malicious VM then it discard it so that possibility of co-resident attack is becoming less and efficiency will be improve and secure services are being provided. So in this paper survey on virtual machine threats mainly VM Migration and Co-resident Attack is discussed.
Keywords: Cloud Computing, Iaas, Virtualization, VM Migration, Co-esident Attack
Edition: Volume 3 Issue 12, December 2014
Pages: 1137 - 1140
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Information Technology, United States of America, Volume 13 Issue 11, November 2024
Pages: 616 - 619Building a Global Cross - Regional Data Platform to Centralize Data for a Global Enterprise
Shreesha Hegde Kukkuhalli
Downloads: 0
Research Paper, Information Technology, India, Volume 11 Issue 3, March 2022
Pages: 1642 - 1649Data Integration Strategies in Hybrid Cloud Environments
Sai Kumar Reddy Thumburu
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 12 Issue 7, July 2023
Pages: 674 - 678Big Data Virtualization in Edge Computing
Safa Ismail Nakade
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 8 Issue 3, March 2019
Pages: 1981 - 1987Data Center Optimization for Telecom: Implementing Cost-Effective Strategies to Optimize Data Center Operations in Telecom, Focusing on Efficiency Improvements and Cost Reduction Initiatives, Aligned with Your Data Center Optimization Expertise
Jeevan Manda
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 9 Issue 11, November 2020
Pages: 1748 - 1751The Power of Docker: Containerization for Efficient Software Development and Deployment
Nagaraju Islavath