Survey Paper | Information Technology | India | Volume 3 Issue 12, December 2014
A Literature Survey on Virtualization Security Threats in Cloud Computing
Brona Shah, Jignesh Vania
Cloud Computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources, (for example networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. But it has many security issues they are Lack of trust, loss of control and multitenency. In cloud computing at IaaS Infrastructure is provided so Virtual machines are running in this level and service has been provided. SO there is one security threat is VM Migration. So for preventing this VM Migration problem one protocol is used so through that protocol this problem become less. At this level different VMs of different users are running on the same physical server. So another problem at this level is risk of co-resident attack, in which user of one VM can get information from the another VM. So for reducing this co-resident Attack different policies are there which perform the best when servers are properly configured but if not then there is a risk of co-resident attack so for reduce the risk of this new policy is there in which Previously selected server First is used that is for allocating the server for user. But still there is problem so that another policy in which one agent is there which checks the user and authenticate them and if there is any malicious VM then it discard it so that possibility of co-resident attack is becoming less and efficiency will be improve and secure services are being provided. So in this paper survey on virtual machine threats mainly VM Migration and Co-resident Attack is discussed.
Keywords: Cloud Computing, Iaas, Virtualization, VM Migration, Co-esident Attack
Edition: Volume 3 Issue 12, December 2014
Pages: 1137 - 1140
How to Cite this Article?
Brona Shah, Jignesh Vania, "A Literature Survey on Virtualization Security Threats in Cloud Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14634, Volume 3 Issue 12, December 2014, 1137 - 1140
132 PDF Views | 91 PDF Downloads
Similar Articles with Keyword 'Cloud Computing'
Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020
Pages: 1598 - 1602An Approach to Storage of Data on Cloud Computing and Challenges Involved
Pranshu Prenam, Rahul Chawda
Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016
Pages: 1751 - 1754Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage
Kalyani G. Ktangale, Milind Penurkar
Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017
Pages: 1773 - 1777Optimized Load Balancing in Cloud Computing using Hybrid Approach of Round Robin and Min-Min Scheduling
Muskan Garg, Rajneesh Narula
Research Paper, Information Technology, Iraq, Volume 4 Issue 11, November 2015
Pages: 1736 - 1745Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs
Haider N. Hussain
Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014
Pages: 1137 - 1140A Literature Survey on Virtualization Security Threats in Cloud Computing
Brona Shah, Jignesh Vania
Similar Articles with Keyword 'Iaas'
Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014
Pages: 1137 - 1140A Literature Survey on Virtualization Security Threats in Cloud Computing
Brona Shah, Jignesh Vania
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 2247 - 2251Deployment of Virtual Resources Using Template Management Technology on Openstack
S. L. Mani Deepu, Hemavathi D
Research Paper, Information Technology, Saudi Arabia, Volume 4 Issue 5, May 2015
Pages: 2115 - 2120A Novel and Integrated Assessment of Security Challenges in Cloud Computing
Mohd Muntjir, Mohd Rahul
Research Paper, Information Technology, India, Volume 3 Issue 10, October 2014
Pages: 475 - 483Web User Interface of Hadoop Distributed File System
D Dhananjay, Dr. G. Venkata Rami Reddy
Research Paper, Information Technology, India, Volume 3 Issue 6, June 2014
Pages: 2282 - 2285Load Balancing in Cloud Computing
Samarsinh Prakash Jadhav, Priya R. Deshpande
Similar Articles with Keyword 'Virtualization'
Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014
Pages: 1137 - 1140A Literature Survey on Virtualization Security Threats in Cloud Computing
Brona Shah, Jignesh Vania
Research Paper, Information Technology, India, Volume 3 Issue 5, May 2014
Pages: 628 - 631Implementation of Energy Saving Mechanism for multi core Architecture in Cloud Computing
Kinnari Solanki, Tushar A. Champaneria
Research Paper, Information Technology, Saudi Arabia, Volume 4 Issue 5, May 2015
Pages: 2115 - 2120A Novel and Integrated Assessment of Security Challenges in Cloud Computing
Mohd Muntjir, Mohd Rahul
Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015
Pages: 991 - 996Survey of Optimized CSP Migration
Kadlag R A, Devikar R N
Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017
Pages: 2098 - 2102Virtual Machine Consolidation using Load Balancing algorithm in Cloud Data Center
Manjushri S. Masane, N. P. Kulkarni