Public and Private Cloud Security through Vulnerabilities Assessment of Virtual Machine

Authors

  • Prabhat Bisht Scientist C, NIC, Chandigarh, Haryana India

Keywords:

Virtual Machine Environment (VME), Virtual Machine (VM), Transport Layer Security (TLS), Secure Shell (SSH), Data Encryption Standard (DES), File Transport Protocol (FTP), Secure Socket Layer (SSL), Remote Procedure Call (RPC)

Abstract

Virtualization in cloud computing is one of the biggest milestones leading us to next generation web technology. Use of virtualization technology through virtual machines in cloud computing is rapidly growing and offering best opportunities for availability, reliability, elastically, throughput, scalability, efficiency, and flexibility. Research shows that over 70 percent of organizations are planning to adopt cloud oriented services through virtualization by the end of 2017. Most of the companies delayed adopting cloud virtualization services because of the security concerns or many adopted this technology before adopting advanced security measures. Virtualization is achieved through Virtual Machine (VM) in cloud, so security of virtual machines is a matter of great concern for cloud service provider or cloud service user. Vulnerable Virtual Machine (VM) is a biggest reason for threats, due to which organization valuable information can be compromised. This research paper focus on security of Virtual Machines through vulnerabilities assessment of Virtual Machines in Cloud.

 

References

Peter M. Mell, Timothy Grance, “The NIST definition of cloud computing,” National Institute of Standards and Technology, Vol.1, Issue.1, pp.1-7, 2011.

Talwana Jonathan Charity, Gu Chun Hua ,”Resource Reliability using Fault Tolerance in Cloud Computing,” In the proceedings of the 2016 International Conference on Next Generation Computing Technologies-IEEE, India, 2016.

Fatima Shakeel, Seema Sharma, “Green Cloud Computing: A review on Efficiency of Data Centres and Virtualization of Servers,” In the proceeding of the 2017 International Conference on Computing, Communication and Automation –IEEE, India 2017.

Shruti Sharma, Sharanjit Singh, Amardeep Singh, Ramanpreet Kaur, “Virtualization in Cloud Computing,” International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET) ,Vol.2, Issue.4, pp.2394-4099, 2016

B. Grobauer, T. Walloschek, E. Stocker, "Understanding cloud computing vulnerabilities," IEEE Security & Privacy, Vol.9, Issue.2, pp.50-57, 2011.

Zakira Inayat , Abdullah Gani , Nor Badrul Anuar , Shahid Anwar , Muhammad Khurram Khan ,”Cloud-Based Intrusion Detection and Response System Open Research Issues and Solution”, Arabian Journal of Science and Engineering, Vol.42, pp.399–423, 2017.

Prabhat Bisht, Manmohan Singh Rauthan, “Machine Learning and Natural Language Processing Based Web Application Firewall for Mitigating Cyber Attacks in Cloud,” International Journal of Scientific Research in Computer Science and Engineering, Vol.11, Issue.3, pp.1-15, 2023.

Prabhat Bisht , Manmohan Singh Rauthan , Raj Kishore Bisht , “Component based web application firewall for analyzing and defending SQL injection attack vectors” , International Journal of Recent Technology and Engineering, Vol.8, Issue.3, pp.4183–4190, 2019.

Prabhat Bisht, Devesh Pant, Manmohan Singh Rauthan, “Analyzing and defending web application vulnerabilities through proposed security model in cloud computing”, International journal of science and technology graphic era university, Vol.6, Issue.2, pp.183-196, 2018.

Shahil, U M and Deekshitha, Ms. and Anam M, Nuzha and Basthikodi, Mustafa, “DDOS Attacks in Cloud Computing and its Preventions”, JETIR- International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN: 2349-5162, May, Vol.6, Issue.5, pp.405-408, 2019.

Christof Paar , “Hardware Trojans and Other Threats against Embedded Systems,” In the Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017.

Downloads

Published

2023-08-31

How to Cite

[1]
P. Bisht, “Public and Private Cloud Security through Vulnerabilities Assessment of Virtual Machine”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 11, no. 4, pp. 86–90, Aug. 2023.

Issue

Section

Review Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.