Title :
System and method for mitigating Cross VM attacks in cloud computing by securing the network traffic
Author :
Bhaskar Kumar;Kumar Abhishek;Abhay Kumar;M. P. Singh
Author_Institution :
Sonus Network India, Pvt. Limited, India
fDate :
4/1/2015 12:00:00 AM
Abstract :
Cloud computing involves deploying groups of remote servers and software networks, offering computational resources as a service to clients. The servers are virtualized, which means virtual machines are rapidly provisioned on demand and released without service provider´s interaction. These virtual machines might interact with each other to provide services. Under favorable conditions, it is possible for an intruder to identify the target server and launch a malicious virtual machine on the target to perform side channel attacks against other co-located VMs [5]. This paper discusses about hiding the servers location using a broadcast domain such that opponent is not able to trace the target server after a certain point. In this paper, a cloud computing environment is implemented using Openstack platform. It is shown that this approach is secure against all the possible attacks that an intruder can use to trace the target. Some more steps to further enhance the security is also suggested. The size of the broadcast domain varies according to available bandwidth. This design can be easily implemented in cloud computing platforms, where virtual resources are dynamically created and destroyed.
Keywords :
"Servers","Cloud computing","Bandwidth","Security","Receivers","Computers"
Conference_Titel :
Computer Applications & Industrial Electronics (ISCAIE), 2015 IEEE Symposium on
DOI :
10.1109/ISCAIE.2015.7298360