Back to Search
Start Over
C2Hunter: Detection and Mitigation of Covert Channels in Data Centers
- Source :
- Handbook on Data Centers ISBN: 9781493920914, Handbook on Data Centers
- Publication Year :
- 2015
- Publisher :
- Springer New York, 2015.
-
Abstract
- Data centers provides both the applications, systems software and the hardware as services over the Internet, which is named cloud computing [1–3]. It is core infrastructure of cloud computing, supporting dynamic deployment and elastic resource management. With the powerful computing and storing capabilities, cloud computing has become increasingly popular [4, 5]. The fundamental mechanism of cloud is virtualization which allows virtual machines (VM) instantiate stand-alone operating systems on demand based on a software layer called virtual machine monitor (VMM) or hypervisor [6]. Although the virtualization technology provides strong isolation for the cloud, security and privacy are always the open problems [7]. Some of the problems are essentially traditional web application and data-hosting ones, e.g., phishing, downtime, data loss, and password weakness. One of the new problems introduced by the shared environment to cloud computing is the covert channel attack [8]. By this way, information is leaked from the data centers and meanwhile the security provided by isolation is breaken down [9, 10].
Details
- ISBN :
- 978-1-4939-2091-4
- ISBNs :
- 9781493920914
- Database :
- OpenAIRE
- Journal :
- Handbook on Data Centers ISBN: 9781493920914, Handbook on Data Centers
- Accession number :
- edsair.doi...........088add7e1b272e851f9643dbfacf6097
- Full Text :
- https://doi.org/10.1007/978-1-4939-2092-1_32