2016 IEEE International Conference on Smart Cloud (SmartCloud) 2016
DOI: 10.1109/smartcloud.2016.19
|View full text |Cite
|
Sign up to set email alerts
|

A Framework to Secure the Virtual Machine Image in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…Previous studies have put forth a security framework which can be used to protect the Virtual Machine (VM) image in cloud computing [1]. The present paper details exactly how the conceptual framework has been confirmed through interviews with experts in the field of cloud security.…”
Section: Introductionmentioning
confidence: 82%
See 3 more Smart Citations
“…Previous studies have put forth a security framework which can be used to protect the Virtual Machine (VM) image in cloud computing [1]. The present paper details exactly how the conceptual framework has been confirmed through interviews with experts in the field of cloud security.…”
Section: Introductionmentioning
confidence: 82%
“…This section describes the research methodology which was used to confirm the framework and identify additional requirements which are necessary in order to secure cloud computing VM images, as shown in [1]. The initial framework, shown in Figure 2, was derived from the literature review.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The VMI may include operating system like windows, Linux or Fedora and might contains other resources like applications that are created by organization such as database management system or application server [1]. There are some security issues associated with VMI in cloud computing that has harmful impact on the security of the cloud and might affect confidentiality, integrity or availability [2]. Threat modelling is conducted to identify security threats and draw possible routes threats might follow to attack the VMI.…”
Section: Introductionmentioning
confidence: 99%