Analysis of Virtualization: Vulnerabilities and attacks over virtualized cloud computing

Thumbnail Image

Date

2014

Journal Title

Journal ISSN

Volume Title

Publisher

IASIR

Abstract

Cloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the internet. The means of cloud computing is obtained by the virtualization of the resources such as hardware, platform, operating system and storages devices. Virtualization permits multiple operating systems to run on the same physical machine. Multiple tenants are unaware of the presence of the other tenant with whom they are sharing the resources. The co-existence of multiple virtual machines can be exploited to gain the access over other tenant's data or attack to deny of services. The significant concern is insuring the security and providing isolation between multiple operating systems. The paper explores various kinds of vulnerabilities and attacks associated with the virtualization.

Description

Keywords

Cloud computing, Virtualization, Multi-tenancy, Network-security, Hypervisor

Citation

Kanika and Sidhu, Navjot(2014)Analysis of Virtualization: Vulnerabilities and attacks over virtualized cloud computing. International Journal of Emerging Technologies in Computational and applied Sciences. Vol.8(5), PP.391-396

Endorsement

Review

Supplemented By

Referenced By