Security Engineering for Cloud Computing 2013
DOI: 10.4018/978-1-4666-2125-1.ch003
|View full text |Cite
|
Sign up to set email alerts
|

Three Misuse Patterns for Cloud Computing

Abstract: Cloud computing is a new computing model that allows providers to deliver services on demand by means of virtualization. One of the main concerns in cloud computing is security. In particular, the authors describe some attacks in the form of misuse patterns, where a misuse pattern describes how an attack is performed from the point of view of the attacker. Specially, they describe three misuse patterns: Resource Usage Monitoring Inference, Malicious Virtual Machine Creation, and Malicious Virtual Machine Migra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(22 citation statements)
references
References 9 publications
0
22
0
Order By: Relevance
“…To determine the right selection of hypervisor that meets the need using the performance metrics such as guest memory, maximum host, a virtual processor supported and the CPU overhead. Moreover, to identify the hypervisor capabilities by verifying the guest OS on each hypervisor supports [25], [26].…”
Section: ) Hypervisormentioning
confidence: 99%
“…To determine the right selection of hypervisor that meets the need using the performance metrics such as guest memory, maximum host, a virtual processor supported and the CPU overhead. Moreover, to identify the hypervisor capabilities by verifying the guest OS on each hypervisor supports [25], [26].…”
Section: ) Hypervisormentioning
confidence: 99%
“…Sharing resources between VMs could decrease the safety of every VM [32,33]. As an example, a malicious VM will infer some info regarding alternative VMs through shared memory or alternative shared resources while not would like of compromising the hypervisor.…”
Section: Shared Resourcementioning
confidence: 99%
“…Among other researchers, Henze et al, [18] that data degradation techniques could be implemented in five possible ways such as, suggests it: upgradable, user-oriented, ability-oriented, service-oriented and external data degradation. All techniques are responsible for built-in system functionality apart from user-oriented data degradation and it is held responsible for the process of data retention [19]. Along with other functionalities these techniques, rely on a single point of interaction to except external data degradation techniques.…”
Section: Privacy-by-designmentioning
confidence: 99%
“…In particular, the complexity of cloud computing brings a number of known and unknown uncertainties to both service providers and users [12], [19]. The expanding quantity of personal data means that the demand for cloud computing will continue to rise [29].…”
Section: Introductionmentioning
confidence: 99%