DocumentCode
3672057
Title
System and method for mitigating Cross VM attacks in cloud computing by securing the network traffic
Author
Bhaskar Kumar;Kumar Abhishek;Abhay Kumar;M. P. Singh
Author_Institution
Sonus Network India, Pvt. Limited, India
fYear
2015
fDate
4/1/2015 12:00:00 AM
Firstpage
221
Lastpage
225
Abstract
Cloud computing involves deploying groups of remote servers and software networks, offering computational resources as a service to clients. The servers are virtualized, which means virtual machines are rapidly provisioned on demand and released without service provider´s interaction. These virtual machines might interact with each other to provide services. Under favorable conditions, it is possible for an intruder to identify the target server and launch a malicious virtual machine on the target to perform side channel attacks against other co-located VMs [5]. This paper discusses about hiding the servers location using a broadcast domain such that opponent is not able to trace the target server after a certain point. In this paper, a cloud computing environment is implemented using Openstack platform. It is shown that this approach is secure against all the possible attacks that an intruder can use to trace the target. Some more steps to further enhance the security is also suggested. The size of the broadcast domain varies according to available bandwidth. This design can be easily implemented in cloud computing platforms, where virtual resources are dynamically created and destroyed.
Keywords
"Servers","Cloud computing","Bandwidth","Security","Receivers","Computers"
Publisher
ieee
Conference_Titel
Computer Applications & Industrial Electronics (ISCAIE), 2015 IEEE Symposium on
Type
conf
DOI
10.1109/ISCAIE.2015.7298360
Filename
7298360
Link To Document