• Login
    View Item 
    •   Shocker Open Access Repository Home
    • Engineering
    • Electrical Engineering and Computer Science
    • EECS Faculty Scholarship
    • Ravi Pendse
    • Conference proceedings
    • View Item
    •   Shocker Open Access Repository Home
    • Engineering
    • Electrical Engineering and Computer Science
    • EECS Faculty Scholarship
    • Ravi Pendse
    • Conference proceedings
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Security in multi-tenancy cloud

    View/Open
    Pendse_2010b (739.6Kb)
    Date
    2010-10-05
    Author
    Jasti, Amarnath
    Shah, Payal Hemchand
    Nagaraj, Rajeev
    Pendse, Ravi
    Metadata
    Show full item record
    Citation
    Jasti, A.; Shah, P.; Nagaraj, R.; Pendse, R.; , "Security in multi-tenancy cloud," Security Technology (ICCST), 2010 IEEE International Carnahan Conference on, vol., no., pp.35-41, 5-8 Oct. 2010 doi: 10.1109/CCST.2010.5678682
    Abstract
    Cloud computing creates exciting opportunities like reduced costs and flexibility to the users. It also comprises of some risks like data security within the cloud. Several common security threats like data leakage, insecure API's, and malicious inside users are applicable to cloud computing environment as well. In this paper, the authors consider a cloud computing service where multiple Virtual Machines (VM's) are co-located on the same physical server. In such systems, physical resources are transparently shared by the VMs belonging to multiple users. In systems like these, a malicious user having control of a VM can try to gain control over other VM's resources or utilize all system resources leading to denial of resource attack over other VM users. A malicious user can also try to steal the data of other users located on the same server by compromising hypervisor file system (logical volumes). In this paper, security threats associated with cloud computing environment are evaluated. Authors also explore how such co-existent of VM's can be exploited to gain access over other user's data or deny service and propose constructive security measures that can be deployed to avoid such attacks. Description: Full text is not available due to publisher’s copyright restrictions.
    Description
    The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954
    URI
    http://hdl.handle.net/10057/3777
    http://dx.doi.org/10.1109/CCST.2010.5678682
    Collections
    • Conference proceedings
    • EECS Research Publications

    Browse

    All of Shocker Open Access RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy TypeThis CollectionBy Issue DateAuthorsTitlesSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace software copyright © 2002-2023  DuraSpace
    DSpace Express is a service operated by 
    Atmire NV