International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Survey Paper | Information Technology | India | Volume 3 Issue 12, December 2014

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Cloud Computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources, (for example networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. But it has many security issues they are Lack of trust, loss of control and multitenency. In cloud computing at IaaS Infrastructure is provided so Virtual machines are running in this level and service has been provided. SO there is one security threat is VM Migration. So for preventing this VM Migration problem one protocol is used so through that protocol this problem become less. At this level different VMs of different users are running on the same physical server. So another problem at this level is risk of co-resident attack, in which user of one VM can get information from the another VM. So for reducing this co-resident Attack different policies are there which perform the best when servers are properly configured but if not then there is a risk of co-resident attack so for reduce the risk of this new policy is there in which Previously selected server First is used that is for allocating the server for user. But still there is problem so that another policy in which one agent is there which checks the user and authenticate them and if there is any malicious VM then it discard it so that possibility of co-resident attack is becoming less and efficiency will be improve and secure services are being provided. So in this paper survey on virtual machine threats mainly VM Migration and Co-resident Attack is discussed.

Keywords: Cloud Computing, Iaas, Virtualization, VM Migration, Co-esident Attack

Edition: Volume 3 Issue 12, December 2014

Pages: 1137 - 1140


How to Cite this Article?

Brona Shah, Jignesh Vania, "A Literature Survey on Virtualization Security Threats in Cloud Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14634, Volume 3 Issue 12, December 2014, 1137 - 1140

35 PDF Views | 26 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud Computing'

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this article

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2057 - 2060

Secure Load Rebalancing in Cloud Environment

Mannava Praveen Kumar, Srinivas LNB

Share this article

Review Papers, Information Technology, India, Volume 5 Issue 7, July 2016

Pages: 1953 - 1955

The Security Threats in Cloud Architecture-A Review

Simanjot Kaur, Anurag Singh Tomar

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1254 - 1256

Security in Multimedia Cloud Computing Using Encryption Algorithms: A Survey

Gemini Garg, Jaspreet Kaur

Share this article



Similar Articles with Keyword 'Iaas'

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2247 - 2251

Deployment of Virtual Resources Using Template Management Technology on Openstack

S. L. Mani Deepu, Hemavathi D

Share this article

Research Paper, Information Technology, Saudi Arabia, Volume 4 Issue 5, May 2015

Pages: 2115 - 2120

A Novel and Integrated Assessment of Security Challenges in Cloud Computing

Mohd Muntjir, Mohd Rahul

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 475 - 483

Web User Interface of Hadoop Distributed File System

D Dhananjay, Dr. G. Venkata Rami Reddy

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 2282 - 2285

Load Balancing in Cloud Computing

Samarsinh Prakash Jadhav, Priya R. Deshpande

Share this article



Similar Articles with Keyword 'Virtualization'

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this article

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 991 - 996

Survey of Optimized CSP Migration

Kadlag R A, Devikar R N

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, Indonesia, Volume 3 Issue 12, December 2014

Pages: 213 - 218

Analysis and Implementation of Data Center Virtualization at the ICT Center Fkip UNS

Puspanda Hatta, Widyawan, Warsun Najib

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 5, May 2014

Pages: 628 - 631

Implementation of Energy Saving Mechanism for multi core Architecture in Cloud Computing

Kinnari Solanki, Tushar A. Champaneria

Share this article

Research Paper, Information Technology, Saudi Arabia, Volume 4 Issue 5, May 2015

Pages: 2115 - 2120

A Novel and Integrated Assessment of Security Challenges in Cloud Computing

Mohd Muntjir, Mohd Rahul

Share this article
Top