Skip to main content

Co-resident Attack in Cloud Computing: An Overview

  • Living reference work entry
  • First Online:
Encyclopedia of Big Data Technologies
  • 313 Accesses

Abstract

A cloud rewards organizations with agility and cost-efficiency, but goods of the cloud come with security challenges. The sheer volume and immense size of modern-day clouds (big data) make them hard to protect and consequently, vulnerable to abuse. Security and privacy issues are intensified by velocity, volume, and a variety of big data, such as large-scale cloud infrastructures, diversity of data sources and formats, and a massive amount of inter-cloud migration. The virtualization method allows sharing of computing resources among many tenants, which may be business partners, suppliers, competitors, or attackers. Even though there is substantial logical isolation among the virtual machines (VMs), shared hardware creates vulnerabilities to co-resident attacks. This paper gives a glimpse of security issues in the cloud, specifically related to VMs. Here, we concentrate our study on co-resident VM attack and its defense methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Bhargava B, Çho Y, Kim A (2010) Research in cloud security and privacy. https://www.cs.purdue.edu/homes/bb/cloud/Security-Privacy.ppt

  • Cloud-Security-Alliance (2012) Top ten big data security and privacy challenges. https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Big_Data_Top_Ten_v1.pdf

  • Han Y, Alpcan T, Chan J, Leckie C, Rubinstein BIP (2016) A game theoretical approach to defend against co-resident attacks in cloud computing: preventing co-residence using semi-supervised learning. IEEE Trans Inf Forensics Secur 11(3):556–570

    Article  Google Scholar 

  • Han Y, Chan J, Alpcan T, Leckie C (2017) Using virtual machine allocation policies to defend against co-resident attacks in cloud computing. IEEE Trans Dependable Secure Comput 14(1):95–108

    Google Scholar 

  • Hyde D (2009) A survey on the security of virtual machines. www.cse.wustl.edu/jain/cse571-09/ftp/vmsec/index.html

  • Inukollu VN, Arsi S, Ravuri SR (2014) Security issues associated with big data in cloud computing. Int J Netw Secur Appl 6(3):45

    Google Scholar 

  • Mishra SK, Putha D, Rodrigues JJ, Sahoo B, Dutkiewicz E (2018a, in press) Sustainable service allocation using metaheuristic technique in fog server for industrial applications. IEEE Trans Ind Inf

    Google Scholar 

  • Mishra SK, Puthal D, Sahoo B, Jena SK, Obaidat MS (2018b) An adaptive task allocation technique for green cloud computing. J Supercomput 74(1):370–385

    Article  Google Scholar 

  • Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63(2):561–592

    Article  Google Scholar 

  • Puthal D, Sahoo B, Mishra S, Swain S (2015) Cloud computing features, issues, and challenges: a big picture. In: Computational Intelligence and Networks (CINE), 2015 International Conference on, IEEE, pp 116–123

    Google Scholar 

  • Sahoo S, Nawaz S, Mishra SK, Sahoo B (2015) Execution of real time task on cloud environment. In: India Conference (INDICON), 2015 Annual IEEE, IEEE, pp 1–5

    Google Scholar 

  • Sahoo S, Sahoo B, Turuk AK, Mishra SK (2016) Real time task execution in cloud using mapreduce framework. In: Resource management and efficiency in cloud computing environments, IGI Global, p 190

    Google Scholar 

  • Xiao Z, Xiao Y (2013) Security and privacy in cloud computing. IEEE Commun Surv Tutorials 15(2):843–859

    Article  Google Scholar 

  • Zhang Y, Juels A, Oprea A, Reiter MK (2011) Homealone: co-residency detection in the cloud via side-channel analysis. In: 2011 IEEE Symposium on Security and Privacy, pp 313–328

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Sahoo, S., Mishra, S.K., Sahoo, B., Turuk, A.K. (2018). Co-resident Attack in Cloud Computing: An Overview. In: Sakr, S., Zomaya, A. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-63962-8_322-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63962-8_322-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63962-8

  • Online ISBN: 978-3-319-63962-8

  • eBook Packages: Springer Reference MathematicsReference Module Computer Science and Engineering

Publish with us

Policies and ethics