Back to Search Start Over

C2Hunter: Detection and Mitigation of Covert Channels in Data Centers

Authors :
Samee U. Khan
Yanjun Wu
Yuqi Lin
Jingzheng Wu
Nasro Min-Allah
Bei Guan
Yongji Wang
Source :
Handbook on Data Centers ISBN: 9781493920914, Handbook on Data Centers
Publication Year :
2015
Publisher :
Springer New York, 2015.

Abstract

Data centers provides both the applications, systems software and the hardware as services over the Internet, which is named cloud computing [1–3]. It is core infrastructure of cloud computing, supporting dynamic deployment and elastic resource management. With the powerful computing and storing capabilities, cloud computing has become increasingly popular [4, 5]. The fundamental mechanism of cloud is virtualization which allows virtual machines (VM) instantiate stand-alone operating systems on demand based on a software layer called virtual machine monitor (VMM) or hypervisor [6]. Although the virtualization technology provides strong isolation for the cloud, security and privacy are always the open problems [7]. Some of the problems are essentially traditional web application and data-hosting ones, e.g., phishing, downtime, data loss, and password weakness. One of the new problems introduced by the shared environment to cloud computing is the covert channel attack [8]. By this way, information is leaked from the data centers and meanwhile the security provided by isolation is breaken down [9, 10].

Details

ISBN :
978-1-4939-2091-4
ISBNs :
9781493920914
Database :
OpenAIRE
Journal :
Handbook on Data Centers ISBN: 9781493920914, Handbook on Data Centers
Accession number :
edsair.doi...........088add7e1b272e851f9643dbfacf6097
Full Text :
https://doi.org/10.1007/978-1-4939-2092-1_32