CLOUD SECURITY FRAMEWORK FOR PUBLIC IAAS
2
Author(s):
ABHINAV SHARMA , MUKESH KUMAR RANA
Vol - 6, Issue- 7 ,
Page(s) : 22 - 26
(2015 )
DOI : https://doi.org/10.32804/IRJMST
Abstract
Cloud computing has arrived as a solution to reduce costs in organizations and at the same time offer on-demand resources and computation without requiring to create an IT infrastructure.
- P. Ferrie, Attacks on Virtual Machine Emulators, Symantec Advanced Threat Research, December 2006.
- T. Garfinkel, K. Adams, A. Warfield and J. Franklin, Compatibility is Not Transparency: VMM Detection Myths and Realities, 11th Workshop on Hot Topics in Operating Systems (HOTOS-X), 2007.
- D. Grunwald and S. Ghiasi, Microarchitectural denial of service: Insuring microarchitectural fairness, International Symposium on Microarchitecture – MICRO ’02, pp. 409–418, IEEE, 2002.
- E. L. Haletky, VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers, Prentice Hall, 2008.
- D. Hyuk Woo and H.H. Lee. Analyzing performance vulnerability due to resource denial of service attack on chip multiprocessors. Workshop on Chip Multiprocessor Memory Systems and Interconnects, 2007.
- D. Hyde, A Survey on the Security of Virtual Machines, April 2009, http://www1.cse.wustl.edu/~jain/cse571-09/ftp/vmsec.pdf
- C. Jarabek, A Review of Cloud Computing Security: Virtualization, Side-Channel Attacks, and Management, Department of Computer Science, University of Calgary, 2010.
- R. L. Krutz and R. D. Vines, Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Wiley Publishing.
- T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, In Proceedings of the 16th ACM conference on Computer and communications security (CCS '09), 2009.
- E. Tromer, D. A. Osvik, and A. Shamir, Efficient cache attacks on AES, and countermeasures, Journal of Cryptology, July 2009.
- A. T. Velte, T. J. Velte, R. Elsenpeter, Cloud Computing: A Practical Approach, McGraw-Hill, 2010.
- Y. Zhang, A. Juels, A. Oprea and M. K. Reiter, HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis, Proceedings of the IEEE Symposium on Security and Privacy, May 2011.
|