Get help with any kind of assignment - from a high school essay to a PhD dissertation
Cloud Confidentiality The confidentiality of the cloud, or a system, can be guaranteed only under the condition that it's able to stop unauthorized access. Zhifeng et al. (2013) says that within cloud environments, confidentiality implies that a client's information and computation activities should be kept confidential from the the cloud supplier and other clients. Confidentiality remains among the greatest concerns in regards to cloud computing. This is mostly due to the fact that customers outsource their data and computation activities on cloud servers, which can be controlled and managed by possibly untrustworthy cloud suppliers . X. A. Hazards to Cloud Computing Confidentiality 1) Cross-VM Attack through Negative Channels: This form of attack is one that exploits one of the common techniques used by cloud suppliers, virtualization. This technique allows for the cloud supplier to dynamically share the underlying physical tools and also gives rise to the problem of multi-tenancy, in which different customers could be residing on the same physical machine. Ristenpart et al. [two. X] illustrates the occurrence of the attack on the Amazon EC2 platform. The attack utilizes side channels that Juels (2012) defines as: vectors of data leakage that arise as a result of system design as opposed to a feature [3. X. One such case in point is the cache of an individual system. Using multi-tenancy, the cache could be shared with two distinct customers and you might be able to deduce some information about another by examining the cache continuously. Though the cache from design wasn't intended to transmit data between the two clients, may effectively do so, which makes it a negative channel. The attack is made up of two major steps: placement and extraction. Placement.