Get help with any kind of assignment - from a high school essay to a PhD dissertation

Privacy and Security in Cloud Computing Essay

Assignment id 1011642
Discipline Writing
Assignment type Essay
Words 1586
looking for essay samples online?
OR
The essay did not fit your needs?
You can order an essay on any topic
Order a new paper

Cloud Confidentiality The confidentiality of the cloud, or a system, can be guaranteed only under the condition that it's able to stop unauthorized access. Zhifeng et al. (2013) says that within cloud environments, confidentiality implies that a client's information and computation activities should be kept confidential from the the cloud supplier and other clients. Confidentiality remains among the greatest concerns in regards to cloud computing. This is mostly due to the fact that customers outsource their data and computation activities on cloud servers, which can be controlled and managed by possibly untrustworthy cloud suppliers [1]. X. A. Hazards to Cloud Computing Confidentiality 1) Cross-VM Attack through Negative Channels: This form of attack is one that exploits one of the common techniques used by cloud suppliers, virtualization. This technique allows for the cloud supplier to dynamically share the underlying physical tools and also gives rise to the problem of multi-tenancy, in which different customers could be residing on the same physical machine. Ristenpart et al. [two. X] illustrates the occurrence of the attack on the Amazon EC2 platform. The attack utilizes side channels that Juels (2012) defines as: vectors of data leakage that arise as a result of system design as opposed to a feature [3. X. One such case in point is the cache of an individual system. Using multi-tenancy, the cache could be shared with two distinct customers and you might be able to deduce some information about another by examining the cache continuously. Though the cache from design wasn't intended to transmit data between the two clients, may effectively do so, which makes it a negative channel. The attack is made up of two major steps: placement and extraction. Placement.

More than 7 000 students trust us to do their work
90% of customers place more than 5 orders with us
Special price $5 /page
PLACE AN ORDER
Assignment type
Check the price
for your assignment
FREE