2020
DOI: 10.14569/ijacsa.2020.0110743
|View full text |Cite
|
Sign up to set email alerts
|

Virtual Machine Escape in Cloud Computing Services

Abstract: It's of axioms; every progress that is devised in the field of facilitating daily life through technology is matched by many complications in terms of the methods that led to the creation of these inventions and how to maintain their sustainability, consistency, and development. In digital world that became not only as axiom of its nature, but it is now one of the main inherent features that define digital technology. Whereas Major international companies are in a big race to produce the new development and in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 7 publications
(14 reference statements)
0
4
0
Order By: Relevance
“…Since PaaS supports a wide range of software including proprietary, open-source, and third-party tools, flaws that exist in any of these components lead to security vulnerabilities. Attack simulation and threat (Abusaimeh, 2020) An access control model developed by D. Bell and J. LaPadula (Wu et al, 2017) Penetration test for virtualization environment (Tank et al, 2019) Hypervisor hardening (Rakotondravony et al, 2017) Interposing the interactions in-between the guest VMs and hypervisor through clearly defined entry and exit points by using CloudVisor (Szefer & Lee, 2012) Hyperjacking -an attacker takes control over the hypervisor and thereby creates attacks…”
Section: Security Issues In Paas and Their Solving Methodsmentioning
confidence: 99%
“…Since PaaS supports a wide range of software including proprietary, open-source, and third-party tools, flaws that exist in any of these components lead to security vulnerabilities. Attack simulation and threat (Abusaimeh, 2020) An access control model developed by D. Bell and J. LaPadula (Wu et al, 2017) Penetration test for virtualization environment (Tank et al, 2019) Hypervisor hardening (Rakotondravony et al, 2017) Interposing the interactions in-between the guest VMs and hypervisor through clearly defined entry and exit points by using CloudVisor (Szefer & Lee, 2012) Hyperjacking -an attacker takes control over the hypervisor and thereby creates attacks…”
Section: Security Issues In Paas and Their Solving Methodsmentioning
confidence: 99%
“…However, this paper didn't address the scalability of its proposed algorithm. Jeevitha, N., and Dr G. Kesavaraj (2016) [9]: Due to the dynamic nature of the mobile environment, unreliable connection could lead to data loss which increases the complexity in making correct offloading decisions which could lead to the current approaches failing to switch context reliably. The cloud needs to be efficient and should be able to handle a large number of users accessing its resources at once for efficient offloading while factoring:…”
Section:  Phone2cloudmentioning
confidence: 99%
“…Fault-tolerance: Unreliable connections should be expected when attempting to create and energy efficient offloading method [9].…”
Section:  Phone2cloudmentioning
confidence: 99%
“…It offers a diverse array of services and resources over the Internet that can be easily customized and accessed as needed [2]. This cutting-edge architecture enables consumers to leverage configurable computing resources, such as applications, storage, servers, and networks [3,4]. Cloud computing is primarily characterized by its capacity to offer flexibility, agility, and cost-effectiveness by abstracting and virtualizing resources [5].…”
Section: Introductionmentioning
confidence: 99%