首页    期刊浏览 2024年12月01日 星期日
登录注册

文章基本信息

  • 标题:An Analysis on the Possibilities of Covert Transfers between Virtual Machines Clustered In Cloud Computing: Survey
  • 本地全文:下载
  • 作者:Wilson Bakasa ; Kudakwashe Zvarevashe ; Nicholas N. Karekwaivanane
  • 期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
  • 印刷版ISSN:2320-9798
  • 电子版ISSN:2320-9801
  • 出版年度:2014
  • 卷号:2
  • 期号:6
  • 出版社:S&S Publications
  • 摘要:Cloud Computing has emerged to be one of the fast growing technology with a lot of devices being partof the cloud. A lot of applications have been deployed into the cloud for use by different users ranging from businessapplications, gaming applications, educational applications, health applications and other scientific applications. Asdifferent hardware, software and services are being deployed to provide cloud computing also a great number ofvulnerabilities, attacks and threats arise that becomes an issue to the integrity, confidentiality and availability of cloudcomputing. The paper Covert Transfer between Virtual Machines in Cloud Computing looks at how covert transfersmay compromise the security measure placed for cloud computing. Covert Transfers cause information leaks that affectthe integrity, availability and confidentiality of cloud computing resources. Although achieving 100% security isunrealistic we aim to propose countermeasures that would give a favorable cost/benefit analysis for the consumers andproviders of the services. We shall look into some of the issues that may cause the covert transfers.
  • 关键词:cloud computing; covert transfers; virtual machines and security countermeasures
国家哲学社会科学文献中心版权所有