2018 Fifth International Conference on Software Defined Systems (SDS) 2018
DOI: 10.1109/sds.2018.8370441
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of VM communication for VM-based cloud security systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Those service share core switches, and use network virtualization technology to isolate and ensure service quality. The aggregation switch is responsible for the physical access of the physical server, and the virtual aggregation switch is responsible for the access of the VPC [20]. The computing area is connected to the core switching equipment.…”
Section: ) Computing Areamentioning
confidence: 99%
See 1 more Smart Citation
“…Those service share core switches, and use network virtualization technology to isolate and ensure service quality. The aggregation switch is responsible for the physical access of the physical server, and the virtual aggregation switch is responsible for the access of the VPC [20]. The computing area is connected to the core switching equipment.…”
Section: ) Computing Areamentioning
confidence: 99%
“…In accordance with the requirements of CPCv2.0 Lv.3, the above mentioned capabilities are deployed in the Virtual Machine (VM) in the computing area. Because it is in the VM, it can be isolated logically but not physically [9], [20]. It is suitable for general The User's Security Service Order System is dedicated to the administrators of general users.…”
Section: General User Security Commercial Plan a Deployment 1) Deploy...mentioning
confidence: 99%
“…For cloud users, poor VM communication extends tenant tasks and VM lease time, eventually increasing their costs. On the other hand, the poor communication between VMs also introduces security vulnerabilities [13]. Al-Said et al [14] outlined security challenges that exist in virtualization techniques and which are used to support several customers on one shared physical infrastructure.…”
Section: Related Workmentioning
confidence: 99%
“…However, in reality, each colocated VM will depend on the same PM where hardware, like CPUs or memory elements, is shared by all the VMs. Therefore, a VM's private information may be accessed by its neighboring VM by launching side-channel attacks [9][10][11][12], as shown in Figure 2. Here, a hypervisor or virtual machine monitor (VMM) creates and runs VMs on a hosting PM.…”
Section: Introductionmentioning
confidence: 99%