2012
DOI: 10.1007/s11416-012-0168-x
|View full text |Cite
|
Sign up to set email alerts
|

On covert channels between virtual machines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(15 citation statements)
references
References 7 publications
0
15
0
Order By: Relevance
“…Cloud computing relies on a lot of technologies such as virtualization, web browsers and web services in developing cloud environments. Therefore, the presence of any gap in any of these techniques reflected the impact on Ranjith et al (2012); Zhang et al (2012) Digital signatures Somani et al (2010) Encryption Harnik et al (2010) Homomorphic encryption Tebaa et al (2012) Absolute allocation/deallocation of resources with I virtual machines Ranjith et al (2012) Unlimited migration: virtual machines can be emigrated from server to another because of hardware maintenance, fault tolerance or load balance Dawoud et al (2010) Uncontrolled snapshots: flexibility can be provided by I TCCP Santos et al (2009) copying virtual machines which leaks data, VNSS Xiaopeng et al (2010) Garfinkel andRosenblum (2005) PALM Zhang et al (2008) the cloud significantly. Table 3 provides a detailed analysis of vulnerabilities in virtualization.…”
Section: Vulnerabilities Of Virtualizationmentioning
confidence: 99%
“…Cloud computing relies on a lot of technologies such as virtualization, web browsers and web services in developing cloud environments. Therefore, the presence of any gap in any of these techniques reflected the impact on Ranjith et al (2012); Zhang et al (2012) Digital signatures Somani et al (2010) Encryption Harnik et al (2010) Homomorphic encryption Tebaa et al (2012) Absolute allocation/deallocation of resources with I virtual machines Ranjith et al (2012) Unlimited migration: virtual machines can be emigrated from server to another because of hardware maintenance, fault tolerance or load balance Dawoud et al (2010) Uncontrolled snapshots: flexibility can be provided by I TCCP Santos et al (2009) copying virtual machines which leaks data, VNSS Xiaopeng et al (2010) Garfinkel andRosenblum (2005) PALM Zhang et al (2008) the cloud significantly. Table 3 provides a detailed analysis of vulnerabilities in virtualization.…”
Section: Vulnerabilities Of Virtualizationmentioning
confidence: 99%
“…In associate degree organized manner they analyze the prevailing security in vulnerabilities and threats of the cloud computing [34,35]. Within the table three they outline every vulnerability and threat by explaining what cloud service model or model area unit plagued by this security downside [36,37].…”
Section: Analysis Of Security Issues In Cloud Computingmentioning
confidence: 99%
“…The inherent vulnerabilities of internal network in host and Local Area Network (LAN) pose threat to the VMs when they are live migrated. These security challenges are presented in (Modi et al 2012;Qina et al 2012;Ranjith et al 2012;. It is believed that the VM migration security is an important research area.…”
Section: List Of Figuresmentioning
confidence: 99%