VIRTUAL MACHINE SECURITY SCHEME AGAINST CO-RESIDENT ATTACK IN CLOUD COMPUTING

Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 5

Abstract

Cloud computing provide users and enterprises with various capabilities to store and process their data. Cloud security refers to a broad set of policies, technologies and controls deploy to product data. However, customers can face new security risks when they use cloud computing platforms. Previous works mainly attempt to address the problem by eliminating side channels. However, most of these methods are not suitable for immediate deployment due to the required modifications to current cloud platforms. In this paper, we focus on one such threat the co-resident attack, where malicious users build side channels and extract private information from virtual machines co-located on the same server. We choose to solve the problem from a different perspective, by studying how to improve the virtual machine allocation policy, so that it is difficult for attackers to co-locate with their targets. To give security by using Network analyzer tool and cloud-simulation tool. N/A Tool is using to analyze network problem, detect network misuse by internal and external users. Documenting regulatory compliance through logging all perimeter and endpoint traffic. Gather the network statics report. The Cloud-Sim toolkit supports both system and behavior modeling of Cloud system components such as data centers, virtual machines (VMs) and resource provisioning policies.

Authors and Affiliations

Nalinipriya G. , Varalakshmi P. J.

Keywords

Related Articles

GPS NOTIFICATION SYSTEM FOR SMS SERVICE USING ANDROID MOBILE

The existing system already used in the mobile navigation system. This system only used for identifying location in a single mobile. But the navigation system only used in the single mobile, not use...

CONDITIONAL PRIVACY PROTOCOL TO OVERCOME SECURITY THREATS IN WIRELESS NETWORK TRANSACTIONS

Even with several technological developments and security protocols, the wireless network transaction is still not in safe waters. Today we come across several frauds related to this wireless network transactions, the ma...

DETECTING SPAM ATTACKS IN E-MAIL USING BAYESIAN ALGORITHM

Spam is a junk mail that increase problem through internet. Spam is used to steal some confidential information. Spam also spread Worms, Viruses, Trojans and cookies. The free availability of e-mail service helps the med...

GEO-DISTRIBUTED MAP REDUCE FRAMEWORK FOR COST EFFICIENT BIG DATA ANALYSIS

Big data analysis is one of the major challenges of current era. The limits to what can be done are often times due to how much data can be processed in a given time-frame Implementation of map reduce framework in Hadoop...

EMPLOYEE RELATED LEGISLATION FOR IT SECTOR – INDIAN PERSPECTIVE

There are plethora of legal requirements in India which are to be complied by industries. Over the years some of the employee related laws were amended in line with the changing industrial policies of the government. How...

Download PDF file
  • EP ID EP400047
  • DOI -
  • Views 104
  • Downloads 0

How To Cite

Nalinipriya G. , Varalakshmi P. J. (2015). VIRTUAL MACHINE SECURITY SCHEME AGAINST CO-RESIDENT ATTACK IN CLOUD COMPUTING. Elysium Journal of Engineering Research and Management, 2(5), -. https://europub.co.uk./articles/-A-400047