Local cover image
Local cover image
Image from Google Jackets

Defending Against Side Channel Attacks in Cloud Resource Management

By: Publication details: Nagercoil i-manager's 2021Edition: Vo.8(1), Jan-JunDescription: 1-7pSubject(s): Online resources: In: i-manager's journal on cloud computing (JCC)Summary: cloud computing environment allows for the sharing of highly scalable hardware and software resources over the internet. Virtual Machines (VM) allow the cloud provider to share hardware resources with cloud clients. Co-resident VMs are Virtual Machines (VMs) that run on the same physical server. The Virtual Machines in Co-Residence are logically separated from one another. The harmful users' side channels compromise the logical isolation. Co-resident attacks are described as unauthorized users accessing sensitive information from Co-resident VMs. Malicious users gain access to critical information such as cryptographic keys, workloads, and web traffic rates. Co-location, co-residence, and coresidency threats are all terms used to describe a Co-resident attack. The Virtual Machine allocation policy is used to determine where the Virtual Machines should be placed on the physical server. The malicious user co-locates their Virtual Machine with the target Virtual Machine. The Virtual Machine deployment procedure takes into account security, workload balancing, and power consumption criteria. Secure metrics are defined to assess the VM allocation policy's security. The Balanced VM Allocation Policy is designed to distribute virtual machines among physical servers. With security metrics, the Previous Selected Server First (PSSF) policy is applied. With the workload balance parameter, the least VM allocation policy, most VM allocation policy, and random allocation policy are applied. Within the same environment, the data centres are connected to the Virtual Machines. With centralised and distributed scheduling algorithms, the attack-resistant Virtual Machine Management framework is built. Side channel attacks are prevented during live VM transfer. Multiple data centre management mechanisms have been added to the system. To allocate virtual machines on the physical server, the Distributed VM Placement (DVMP) policy is created.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Status Barcode
Articles Abstract Database Articles Abstract Database School of Engineering & Technology Archieval Section Not for loan 2022-0699
Total holds: 0

cloud computing environment allows for the sharing of highly scalable hardware and software resources over the internet. Virtual Machines (VM) allow the cloud provider to share hardware resources with cloud clients. Co-resident VMs are Virtual Machines (VMs) that run on the same physical server. The Virtual Machines in Co-Residence are logically separated from one another. The harmful users' side channels compromise the logical isolation. Co-resident attacks are described as unauthorized users accessing sensitive information from Co-resident VMs. Malicious users gain access to critical information such as cryptographic keys, workloads, and web traffic rates. Co-location, co-residence, and coresidency threats are all terms used to describe a Co-resident attack. The Virtual Machine allocation policy is used to determine where the Virtual Machines should be placed on the physical server. The malicious user co-locates their Virtual Machine with the target Virtual Machine. The Virtual Machine deployment procedure takes into account security, workload balancing, and power consumption criteria. Secure metrics are defined to assess the VM allocation policy's security. The Balanced VM Allocation Policy is designed to distribute virtual machines among physical servers. With security metrics, the Previous Selected Server First (PSSF) policy is applied. With the workload balance parameter, the least VM allocation policy, most VM allocation policy, and random allocation policy are applied. Within the same environment, the data centres are connected to the Virtual Machines. With centralised and distributed scheduling algorithms, the attack-resistant Virtual Machine Management framework is built. Side channel attacks are prevented during live VM transfer. Multiple data centre management mechanisms have been added to the system. To allocate virtual machines on the physical server, the Distributed VM Placement (DVMP) policy is created.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image
Share
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.