Abstract. Ideally, each VM should be deployed independently and isolated form one another while multiple virtual machines share the same physical resource. Unfortunately, the absence of physical isolation inevitably give opportunities to number of security threats. in this paper, A cloud modelbased method for measuring potential threat of virtual machine co-residency detection is proposed to solve the problem, which is caused by co-residency malicious VM, that malicious users steal private message and slow down others' performance. Based on the analysis of co-residency detection behavior characteristics, we utilized the method's advantage in the uncertain conversion of multi-attribute decision and the evaluation of fuzziness and randomness. The method comprehensively considers the threat attributes of co-residency detecting, and gives full play to the advantages of the cloud model, which provides an important basis for the research and application of the detection and defense of the virtual machine in the cloud environment.
IntroductionAt present, cloud security is the inevitable focus when cloud business and academia talking about the development and application of cloud computing. According to the actual operation required, multiple virtual resources may be bound to the same physical resource in the mainstream of cloud computing service platform, which rent physical resource to multi tenants in the model of virtual resources [1]. Theoretically, any two virtual machine are and completely separate independent, but because of the physical dependencies between virtual machines, these virtual machines are not completely independent [5], that is physical basis condition for virtual machine coresident potential threats. Along with the development of cloud computing technology and commercial applications, public cloud resources has been low-priced, malicious users can attack coresident virtual machine or others in cloud platform in low cost. Malicious users can attack the virtual machine and application of other users through the same physical resource sharing of physical resources that result in potential security threats, destruction of data confidentiality and resource availability in the cloud platform [2]. The virtual machine with such threat as shown in Figure 1.