Security Issues Due to Vulnerabilities in the Virtual Machine of Cloud Computing

被引:0
|
作者
Bhagat, Swapnil P. [1 ]
Patil, Vikram S. [2 ]
Meshram, Bandu B. [1 ]
机构
[1] Veermata Jijabai Technol Inst VJTI, Mumbai, Maharashtra, India
[2] SIES Grad Sch Technol, Navi Mumbai, India
关键词
Virtual machine; Vulnerabilities; Security threats; Defense mechanism;
D O I
10.1007/978-981-15-1084-7_60
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The virtual machine is a medium for provisioning cloud resources to customers. Cloud customers are accountable for configuration and security of the applications and the operating system running on virtual machines. The responsibilities of cloud customers include inbound and outbound traffic flow, access control, security configuration and practices. This work analyzes the vulnerabilities inside the virtual machine and security threats engendered due to it. Some of the security threats on a virtual machine are demonstrated with practical implementation on Amazon Web Service (AWS) as a cloud service provider. This paper also discusses general defense mechanisms for these security threats in a virtual machine.
引用
收藏
页码:625 / 634
页数:10
相关论文
共 50 条
  • [1] ON VIRTUAL MACHINE SECURITY ISSUES IN CLOUD COMPUTING
    Zhang, Chaochao
    Bai, Ling
    Chen, Su
    Jiang, Hai
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY: PROCEEDINGS, 2012, : 75 - 79
  • [2] Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities
    Dahbur, Kamal
    Mohammad, Bassil
    Tarakji, Ahmad Bisher
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2011, 1 (03) : 1 - 11
  • [3] Security Strategy for Virtual Machine Allocation in Cloud Computing
    Jia, Hefei
    Liu, Xu
    Di, Xiaoqiang
    Qi, Hui
    Cong, Ligang
    Li, Jinqing
    Yang, Huamin
    [J]. 2018 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2019, 147 : 140 - 144
  • [4] Vulnerabilities and storage security in Cloud Computing
    Derfouf, Mostapha
    Mimouni, Amina
    Eleuldj, Mohsine
    [J]. 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 295 - 299
  • [5] Trusted Model for Virtual Machine Security in Cloud Computing
    Narayana, K. Sathya
    Pasupuleti, Syam Kumar
    [J]. PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 655 - 665
  • [6] Prominent Security Vulnerabilities in Cloud Computing
    Alquwayzani, Alanoud
    Aldossri, Rawabi
    Frikha, Mounir
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (02) : 803 - 813
  • [7] Enhance Security of Cloud Computing through Fork Virtual Machine
    Elham, Hafida
    Lebbat, Adil
    Medromi, Hicham
    [J]. PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, : 448 - 451
  • [8] MONITORING AND ATTESTATION OF VIRTUAL MACHINE SECURITY HEALTH IN CLOUD COMPUTING
    Zhang, Tianwei
    Lee, Ruby B.
    [J]. IEEE MICRO, 2016, 36 (05) : 28 - 37
  • [9] Cloud Computing Security Challenges, Threats and Vulnerabilities
    Sasubilli, Manoj Kumar
    Venkateswarlu, R.
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 476 - 480
  • [10] CLOUD COMPUTING SECURITY ISSUES
    Solanki, Shubhankar
    Khan, Wasim
    Arora, Harshit
    Jain, Anupriya
    [J]. IIOAB JOURNAL, 2019, 10 (02) : 43 - 48