期刊论文详细信息
Journal of Global Research in Computer Sciences
TRUSTED CLOUD ? A SOLUTION FOR CLOUD CARTOGRAPHY
article
E. Kanimozhi1 
[1] Dept of Computer Science and Engineering, Vivekanandha Engineering college for women
关键词: cloud computing;    trusted computing;    cartography;    network probing;    brute – force attack;    side- channel attack;   
来源: Research & Reviews
PDF
【 摘 要 】

Cloud computing provides people a way to share large mount of distributed resources belonging to different organizations. That is a good way to share many kinds of distributed resources, but it also makes security problems more complicate and more important for users than before. Cloud cartography could be used by an attacker who wanted to place his own VM next to a target's VM and exploit vulnerabilities. To create the map, the attacker would deploy a large number of VMs in the service provider's cloud. He could then use the information he gets back from the service provider about his deployments to get a sense of how the provider assigns IP addresses for different instance types and accounts.

【 授权许可】

Unknown   

【 预 览 】
附件列表
Files Size Format View
RO202307140002572ZK.pdf 226KB PDF download
  文献评价指标  
  下载次数:1次 浏览次数:0次