2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC) 2017
DOI: 10.1109/pccc.2017.8280448
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating cloud co-resident attacks via grouping-based virtual machine placement strategy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…The pioneering works presented for secure VM allocation includes minimization of the resource sharing by reducing the number of users per server [126], [9], raising the difficulty of achieving co-residence [127], [128], elimination of side-channels [129], periodic migration of VMs [130] and reducing security risks via VM placement [131]. Han et al [126] have proposed previously-selected-servers-first (PSSF) policy to minimize exposure of benign VMs to malicious VMs.…”
Section: Secure Load Balancingmentioning
confidence: 99%
“…The pioneering works presented for secure VM allocation includes minimization of the resource sharing by reducing the number of users per server [126], [9], raising the difficulty of achieving co-residence [127], [128], elimination of side-channels [129], periodic migration of VMs [130] and reducing security risks via VM placement [131]. Han et al [126] have proposed previously-selected-servers-first (PSSF) policy to minimize exposure of benign VMs to malicious VMs.…”
Section: Secure Load Balancingmentioning
confidence: 99%
“…The considerable works presented for preserving cybersecurity of computational data via VM allocation have focused on both defensive strategies as well as preventive strategies. The defensive strategies include minimization of resource sharing by reducing the number of users per server [11], [16], raising the difficulties for achieving co-residency [17], [18], and eliminating side-channel based cyberthreats [19]. While some other researchers have provided preventive strategies merely by periodic migration of VMs [20], [21].…”
Section: A Related Workmentioning
confidence: 99%
“…To predict future threat status of VM V i , values of R 1 , R 2 , R 3 , R 4 associated with V i are assessed by applying Eqs. ( 14)- (19). The assessment of R 5 is done by analysing the behaviour of co-resident users of V i by using RFC based user classifier trained with U db .…”
Section: Operational Design and Complexitymentioning
confidence: 99%
See 1 more Smart Citation
“…The delicate data from the co-resident VMs are gotten to by the malicious users characterized as co-resident attacks. [10][11][12] The cryptographic keys, workloads, and web traffic rates are the delicate data gotten by the malicious clients. Then, the VMs are placed in the physical server by using the VM allocation policy.…”
Section: Introductionmentioning
confidence: 99%