• DocumentCode
    3672057
  • Title

    System and method for mitigating Cross VM attacks in cloud computing by securing the network traffic

  • Author

    Bhaskar Kumar;Kumar Abhishek;Abhay Kumar;M. P. Singh

  • Author_Institution
    Sonus Network India, Pvt. Limited, India
  • fYear
    2015
  • fDate
    4/1/2015 12:00:00 AM
  • Firstpage
    221
  • Lastpage
    225
  • Abstract
    Cloud computing involves deploying groups of remote servers and software networks, offering computational resources as a service to clients. The servers are virtualized, which means virtual machines are rapidly provisioned on demand and released without service provider´s interaction. These virtual machines might interact with each other to provide services. Under favorable conditions, it is possible for an intruder to identify the target server and launch a malicious virtual machine on the target to perform side channel attacks against other co-located VMs [5]. This paper discusses about hiding the servers location using a broadcast domain such that opponent is not able to trace the target server after a certain point. In this paper, a cloud computing environment is implemented using Openstack platform. It is shown that this approach is secure against all the possible attacks that an intruder can use to trace the target. Some more steps to further enhance the security is also suggested. The size of the broadcast domain varies according to available bandwidth. This design can be easily implemented in cloud computing platforms, where virtual resources are dynamically created and destroyed.
  • Keywords
    "Servers","Cloud computing","Bandwidth","Security","Receivers","Computers"
  • Publisher
    ieee
  • Conference_Titel
    Computer Applications & Industrial Electronics (ISCAIE), 2015 IEEE Symposium on
  • Type

    conf

  • DOI
    10.1109/ISCAIE.2015.7298360
  • Filename
    7298360