2018
DOI: 10.1111/risa.13219
|View full text |Cite
|
Sign up to set email alerts
|

Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes

Abstract: Empowered by virtualization technology, service requests from cloud users can be honored through creating and running virtual machines. Virtual machines established for different users may be allocated to the same physical server, making the cloud vulnerable to coresidence attacks where a malicious attacker can steal a user's data through co-residing their virtual machines on the same server. For protecting data against the theft, the data partition technique is applied to divide the user's data into multiple … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 57 publications
0
5
0
Order By: Relevance
“…Generally, in the case of a large IP packet, it will be splitted into numerous fragments and reassembled into a complete packet to the recipient host. However, POD attack exactly exploits the reassembling packet size of 65,535 bytes greater than its maximum to maliciously manipulate overflow of memory allocated as a result of denial of service [11].…”
Section: Fig 4 Ddos Attack Mechanismmentioning
confidence: 99%
See 1 more Smart Citation
“…Generally, in the case of a large IP packet, it will be splitted into numerous fragments and reassembled into a complete packet to the recipient host. However, POD attack exactly exploits the reassembling packet size of 65,535 bytes greater than its maximum to maliciously manipulate overflow of memory allocated as a result of denial of service [11].…”
Section: Fig 4 Ddos Attack Mechanismmentioning
confidence: 99%
“…CCA could be conducted by various methods such as structured query language (SQL) injection attack, DDoS attack, malicious insider, side channel attack, man-in-themiddle (MITM) attack and abuse of cloud services. Cloud computing attack is the most economically significant threat in the world of virtualization technology, confidential data breach is one of the key diminish potential revenue loss and customer trust [11]. In fact, a massive cyber attack in Sweden in July 2017, a high confidential data stored at cloud system was breached, causing irreversible consequences that exposed national secrets, national security, international wrongdoing, and resignation of ministers.…”
Section: • Hypertext Transfer Protocol (Http) Floodmentioning
confidence: 99%
“…Prevention and detection methods as well as professionally trained cybersecurity specialists are needed to protect patient data, medical devices and other sensitive healthcare systems. [1,7,8,9,11,15,19,25,27,29,31,33,35,36,38,39,40,42,45].…”
Section: Problem Statementmentioning
confidence: 99%
“…The information contained in the test sample is real-time and fair. [7][8][9][10] Second, make clear the structure of artificial neural network. In practice, the concrete model with artificial neural network as the core should be defined first.…”
Section: Model Constructionmentioning
confidence: 99%