International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 103 | Views: 288

Survey Paper | Information Technology | India | Volume 3 Issue 12, December 2014 | Popularity: 6.4 / 10


     

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania


Abstract: Cloud Computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources, (for example networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. But it has many security issues they are Lack of trust, loss of control and multitenency. In cloud computing at IaaS Infrastructure is provided so Virtual machines are running in this level and service has been provided. SO there is one security threat is VM Migration. So for preventing this VM Migration problem one protocol is used so through that protocol this problem become less. At this level different VMs of different users are running on the same physical server. So another problem at this level is risk of co-resident attack, in which user of one VM can get information from the another VM. So for reducing this co-resident Attack different policies are there which perform the best when servers are properly configured but if not then there is a risk of co-resident attack so for reduce the risk of this new policy is there in which Previously selected server First is used that is for allocating the server for user. But still there is problem so that another policy in which one agent is there which checks the user and authenticate them and if there is any malicious VM then it discard it so that possibility of co-resident attack is becoming less and efficiency will be improve and secure services are being provided. So in this paper survey on virtual machine threats mainly VM Migration and Co-resident Attack is discussed.


Keywords: Cloud Computing, Iaas, Virtualization, VM Migration, Co-esident Attack


Edition: Volume 3 Issue 12, December 2014


Pages: 1137 - 1140



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Brona Shah, Jignesh Vania, "A Literature Survey on Virtualization Security Threats in Cloud Computing", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 1137-1140, https://www.ijsr.net/getabstract.php?paperid=SUB14634, DOI: https://www.doi.org/10.21275/SUB14634



Similar Articles

Downloads: 0

Research Paper, Information Technology, United States of America, Volume 13 Issue 11, November 2024

Pages: 616 - 619

Building a Global Cross - Regional Data Platform to Centralize Data for a Global Enterprise

Shreesha Hegde Kukkuhalli

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 11 Issue 3, March 2022

Pages: 1642 - 1649

Data Integration Strategies in Hybrid Cloud Environments

Sai Kumar Reddy Thumburu

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 12 Issue 7, July 2023

Pages: 674 - 678

Big Data Virtualization in Edge Computing

Safa Ismail Nakade

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 8 Issue 3, March 2019

Pages: 1981 - 1987

Data Center Optimization for Telecom: Implementing Cost-Effective Strategies to Optimize Data Center Operations in Telecom, Focusing on Efficiency Improvements and Cost Reduction Initiatives, Aligned with Your Data Center Optimization Expertise

Jeevan Manda

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 9 Issue 11, November 2020

Pages: 1748 - 1751

The Power of Docker: Containerization for Efficient Software Development and Deployment

Nagaraju Islavath

Share this Article



Top