International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 78    Submit Your Rating     Cite This   Download        Certificate

CLOUD SECURITY FRAMEWORK FOR PUBLIC IAAS

    2 Author(s):  ABHINAV SHARMA , MUKESH KUMAR RANA

Vol -  6, Issue- 7 ,         Page(s) : 22 - 26  (2015 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Cloud computing has arrived as a solution to reduce costs in organizations and at the same time offer on-demand resources and computation without requiring to create an IT infrastructure.

  1. P. Ferrie, Attacks on Virtual Machine Emulators, Symantec Advanced Threat Research, December 2006.
  2. T. Garfinkel, K. Adams, A. Warfield and J. Franklin, Compatibility is Not Transparency: VMM Detection Myths and Realities, 11th Workshop on Hot Topics in Operating Systems (HOTOS-X), 2007.
  3. D. Grunwald and S. Ghiasi, Microarchitectural denial of service: Insuring microarchitectural fairness, International Symposium on Microarchitecture – MICRO ’02, pp. 409–418, IEEE, 2002.
  4. E. L. Haletky, VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers, Prentice Hall, 2008.
  5. D. Hyuk Woo and H.H. Lee. Analyzing performance vulnerability due to resource denial of service attack on chip multiprocessors. Workshop on Chip Multiprocessor Memory Systems and Interconnects, 2007.
  6. D. Hyde, A Survey on the Security of Virtual Machines, April 2009, http://www1.cse.wustl.edu/~jain/cse571-09/ftp/vmsec.pdf 
  7. C. Jarabek, A Review of Cloud Computing Security: Virtualization, Side-Channel Attacks, and Management, Department of Computer Science, University of Calgary, 2010.
  8. R. L. Krutz and R. D. Vines, Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Wiley Publishing.
  9. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, In Proceedings of the 16th ACM conference on Computer and communications security (CCS '09), 2009.
  10. E. Tromer, D. A. Osvik, and A. Shamir, Efficient cache attacks on AES, and countermeasures, Journal of Cryptology, July 2009.
  11. A. T. Velte, T. J. Velte, R. Elsenpeter, Cloud Computing: A Practical Approach, McGraw-Hill, 2010.
  12. Y. Zhang, A. Juels, A. Oprea and M. K. Reiter, HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis, Proceedings of the IEEE Symposium on Security and Privacy, May 2011.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details