2011
DOI: 10.1007/978-3-642-21444-8_26
|View full text |Cite
|
Sign up to set email alerts
|

Challenges for Cloud Networking Security

Abstract: Abstract. Cloud computing is widely considered as an attractive service model since the users commitments for investment and operations are minimised, and costs are in direct relation to usage and demand. However, when networking aspects for distributed clouds are considered, there is little support and the effort is often underestimated. The project SAIL is addressing cloud networking as the combination of management for cloud computing and vital networking capabilities between distributed cloud resources inv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 17 publications
0
15
0
1
Order By: Relevance
“…Typical confidentiality threats that can affect virtual networks are sniffing and spoofing attacks [143]. Moreover, if from a user's prospective the virtual network is a private network, it might in reality rely on a public infrastructure and therefore appropriate protections to secure communications are needed [110]. A novel type of attack that exploits virtual networks as a cornerstone for subsequently compromising the whole Cloud system is the "virtual switch attacker model for packet-parsing" (vAMP attack) [131].…”
Section: Confidentialitymentioning
confidence: 99%
“…Typical confidentiality threats that can affect virtual networks are sniffing and spoofing attacks [143]. Moreover, if from a user's prospective the virtual network is a private network, it might in reality rely on a public infrastructure and therefore appropriate protections to secure communications are needed [110]. A novel type of attack that exploits virtual networks as a cornerstone for subsequently compromising the whole Cloud system is the "virtual switch attacker model for packet-parsing" (vAMP attack) [131].…”
Section: Confidentialitymentioning
confidence: 99%
“…However, their main goal is to give a high level description of potential problems, not on providing a fine-grained analysis of how each of the many threats identified apply to specific scenarios (e.g., virtual networking). On the other hand, there are works in the literature that investigate SVNs in more depth, such as (Chowdhury and Boutaba, 2010; Schoo et al, 2011;Natarajan and Wolf, 2012). Unfortunately, since their goal is to survey solutions and to identify challenges in the area, they fail to provide a reusable classification of the virtual networking threats described.…”
Section: Threat Classificationmentioning
confidence: 99%
“…In this proposed model of cloud networking [8], the cloud is designed in a way to protect the data and information of a cloud service consumer in a secure way.…”
Section: Cloud Infrastructure and Usagementioning
confidence: 99%