Абстрактный

An Analysis on the Possibilities of Covert Transfers between Virtual Machines Clustered In Cloud Computing: Survey

Wilson Bakasa, Kudakwashe Zvarevashe, Nicholas N. Karekwaivanane

Cloud Computing has emerged to be one of the fast growing technology with a lot of devices being part of the cloud. A lot of applications have been deployed into the cloud for use by different users ranging from business applications, gaming applications, educational applications, health applications and other scientific applications. As different hardware, software and services are being deployed to provide cloud computing also a great number of vulnerabilities, attacks and threats arise that becomes an issue to the integrity, confidentiality and availability of cloud computing. The paper Covert Transfer between Virtual Machines in Cloud Computing looks at how covert transfers may compromise the security measure placed for cloud computing. Covert Transfers cause information leaks that affect the integrity, availability and confidentiality of cloud computing resources. Although achieving 100% security is unrealistic we aim to propose countermeasures that would give a favorable cost/benefit analysis for the consumers and providers of the services. We shall look into some of the issues that may cause the covert transfers.

Отказ от ответственности: Этот реферат был переведен с помощью инструментов искусственного интеллекта и еще не прошел проверку или верификацию

Индексировано в

Индекс Коперника
Академические ключи
CiteFactor
Космос ЕСЛИ
РефСик
Университет Хамдарда
Всемирный каталог научных журналов
Импакт-фактор Международного инновационного журнала (IIJIF)
Международный институт организованных исследований (I2OR)
Cosmos

Посмотреть больше