Encyclopedia of Big Data Technologies

2019 Edition
| Editors: Sherif Sakr, Albert Y. Zomaya

Co-resident Attack in Cloud Computing: An Overview

  • Sampa Sahoo
  • Sambit Kumar Mishra
  • Bibhudatta Sahoo
  • Ashok Kumar Turuk
Reference work entry
DOI: https://doi.org/10.1007/978-3-319-77525-8_322

Abstract

A cloud rewards organizations with agility and cost-efficiency, but goods of the cloud come with security challenges. The sheer volume and immense size of modern-day clouds (big data) make them hard to protect and consequently, vulnerable to abuse. Security and privacy issues are intensified by velocity, volume, and a variety of big data, such as large-scale cloud infrastructures, diversity of data sources and formats, and a massive amount of inter-cloud migration. The virtualization method allows sharing of computing resources among many tenants, which may be business partners, suppliers, competitors, or attackers. Even though there is substantial logical isolation among the virtual machines (VMs), shared hardware creates vulnerabilities to co-resident attacks. This paper gives a glimpse of security issues in the cloud, specifically related to VMs. Here, we concentrate our study on co-resident VM attack and its defense methods.

This is a preview of subscription content, log in to check access.

References

  1. Bhargava B, Çho Y, Kim A (2010) Research in cloud security and privacy. https://www.cs.purdue.edu/homes/bb/cloud/Security-Privacy.ppt
  2. Cloud-Security-Alliance (2012) Top ten big data security and privacy challenges. https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Big_Data_Top_Ten_v1.pdf
  3. Han Y, Alpcan T, Chan J, Leckie C, Rubinstein BIP (2016) A game theoretical approach to defend against co-resident attacks in cloud computing: preventing co-residence using semi-supervised learning. IEEE Trans Inf Forensics Secur 11(3):556–570CrossRefGoogle Scholar
  4. Han Y, Chan J, Alpcan T, Leckie C (2017) Using virtual machine allocation policies to defend against co-resident attacks in cloud computing. IEEE Trans Dependable Secure Comput 14(1):95–108Google Scholar
  5. Hyde D (2009) A survey on the security of virtual machines. www.cse.wustl.edu/jain/cse571-09/ftp/vmsec/index.html
  6. Inukollu VN, Arsi S, Ravuri SR (2014) Security issues associated with big data in cloud computing. Int J Netw Secur Appl 6(3):45Google Scholar
  7. Mishra SK, Putha D, Rodrigues JJ, Sahoo B, Dutkiewicz E (2018a, in press) Sustainable service allocation using metaheuristic technique in fog server for industrial applications. IEEE Trans Ind InfGoogle Scholar
  8. Mishra SK, Puthal D, Sahoo B, Jena SK, Obaidat MS (2018b) An adaptive task allocation technique for green cloud computing. J Supercomput 74(1):370–385CrossRefGoogle Scholar
  9. Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63(2):561–592CrossRefGoogle Scholar
  10. Puthal D, Sahoo B, Mishra S, Swain S (2015) Cloud computing features, issues, and challenges: a big picture. In: Computational Intelligence and Networks (CINE), 2015 International Conference on, IEEE, pp 116–123Google Scholar
  11. Sahoo S, Nawaz S, Mishra SK, Sahoo B (2015) Execution of real time task on cloud environment. In: India Conference (INDICON), 2015 Annual IEEE, IEEE, pp 1–5Google Scholar
  12. Sahoo S, Sahoo B, Turuk AK, Mishra SK (2016) Real time task execution in cloud using mapreduce framework. In: Resource management and efficiency in cloud computing environments, IGI Global, p 190Google Scholar
  13. Xiao Z, Xiao Y (2013) Security and privacy in cloud computing. IEEE Commun Surv Tutorials 15(2):843–859CrossRefGoogle Scholar
  14. Zhang Y, Juels A, Oprea A, Reiter MK (2011) Homealone: co-residency detection in the cloud via side-channel analysis. In: 2011 IEEE Symposium on Security and Privacy, pp 313–328Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  • Sampa Sahoo
    • 1
  • Sambit Kumar Mishra
    • 1
  • Bibhudatta Sahoo
    • 1
  • Ashok Kumar Turuk
    • 1
  1. 1.National Institute of Technology RourkelaRourkelaIndia

Section editors and affiliations

  • Junjun Chen
    • 1
  • Deepak Puthal
    • 2
  1. 1.Swinburne University of TechnologyMelbourneAustralia
  2. 2.Faculty of Engineering and Information TechnologiesUniversity of Technology Sydney