Abstract: A Literature Survey on Virtualization Security Threats in Cloud Computing
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 103

Survey Paper | Information Technology | India | Volume 3 Issue 12, December 2014

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Cloud Computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources, (for example networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. But it has many security issues they are Lack of trust, loss of control and multitenency. In cloud computing at IaaS Infrastructure is provided so Virtual machines are running in this level and service has been provided. SO there is one security threat is VM Migration. So for preventing this VM Migration problem one protocol is used so through that protocol this problem become less. At this level different VMs of different users are running on the same physical server. So another problem at this level is risk of co-resident attack, in which user of one VM can get information from the another VM. So for reducing this co-resident Attack different policies are there which perform the best when servers are properly configured but if not then there is a risk of co-resident attack so for reduce the risk of this new policy is there in which Previously selected server First is used that is for allocating the server for user. But still there is problem so that another policy in which one agent is there which checks the user and authenticate them and if there is any malicious VM then it discard it so that possibility of co-resident attack is becoming less and efficiency will be improve and secure services are being provided. So in this paper survey on virtual machine threats mainly VM Migration and Co-resident Attack is discussed.

Keywords: Cloud Computing, Iaas, Virtualization, VM Migration, Co-esident Attack

Edition: Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

Share this Article

How to Cite this Article?

Brona Shah, Jignesh Vania, "A Literature Survey on Virtualization Security Threats in Cloud Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14634, Volume 3 Issue 12, December 2014, 1137 - 1140

Enter Your Email Address


Similar Articles with Keyword 'Cloud Computing'

Downloads: 83

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Similar Articles with Keyword 'Iaas'

Downloads: 111

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2247 - 2251

Deployment of Virtual Resources Using Template Management Technology on Openstack

S. L. Mani Deepu, Hemavathi D

Share this Article

Downloads: 114

Research Paper, Information Technology, Saudi Arabia, Volume 4 Issue 5, May 2015

Pages: 2115 - 2120

A Novel and Integrated Assessment of Security Challenges in Cloud Computing

Mohd Muntjir, Mohd Rahul

Share this Article

Similar Articles with Keyword 'Virtualization'

Downloads: 109

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 991 - 996

Survey of Optimized CSP Migration

Kadlag R A, Devikar R N

Share this Article

Downloads: 112

Research Paper, Information Technology, India, Volume 3 Issue 5, May 2014

Pages: 628 - 631

Implementation of Energy Saving Mechanism for multi core Architecture in Cloud Computing

Kinnari Solanki, Tushar A. Champaneria

Share this Article

Similar Articles with Keyword 'Cloud'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 83

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Similar Articles with Keyword 'Computing'

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article

Downloads: 83

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article
Top