Journal article 1034 views 332 downloads
Network and Hypervisor-Based Attacks in Cloud Computing Environments
International Journal of Electronic Security and Digital Forensics, Volume: 13, Issue: 6
Swansea University Authors: Reza Montasari , Stuart Macdonald
-
PDF | Accepted Manuscript
Download (735.7KB)
DOI (Published version): 10.1504/ijesdf.2021.10036493
Abstract
Cloud Computing (CC) has become one of the most transformative computing technologies and a key business avenue, following in the footsteps of main-frames, minicomputers, personal computers, the World Wide Web and smartphones. Its vital features have considerably reduced IT costs, contributing to it...
Published in: | International Journal of Electronic Security and Digital Forensics |
---|---|
ISSN: | 1751-911X 1751-9128 |
Published: |
Inderscience Publishers
2021
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa55398 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
first_indexed |
2020-10-12T09:19:11Z |
---|---|
last_indexed |
2023-03-21T04:10:11Z |
id |
cronfa55398 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0" encoding="utf-8"?><rfc1807 xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"><bib-version>v2</bib-version><id>55398</id><entry>2020-10-12</entry><title>Network and Hypervisor-Based Attacks in Cloud Computing Environments</title><swanseaauthors><author><sid>e420369ac98aaaa7f39248e39a847af1</sid><ORCID>0000-0001-7136-6753</ORCID><firstname>Reza</firstname><surname>Montasari</surname><name>Reza Montasari</name><active>true</active><ethesisStudent>false</ethesisStudent></author><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2020-10-12</date><deptcode>SOSS</deptcode><abstract>Cloud Computing (CC) has become one of the most transformative computing technologies and a key business avenue, following in the footsteps of main-frames, minicomputers, personal computers, the World Wide Web and smartphones. Its vital features have considerably reduced IT costs, contributing to its rapid adoption by businesses and governments worldwide. Despite the many technological and economic benefits that CC offers, at the same time, it poses complex security threats resulting from the use of virtualisation technology. Compromising the security of any component in the cloud virtual infrastructure will negatively affect the security of other elements and so impact the overall system security. Therefore, to create a practical understanding of such threats, this paper provides an analysis of common and underexplored network- and hypervisor-based attacks against CC systems from a technical viewpoint.</abstract><type>Journal Article</type><journal>International Journal of Electronic Security and Digital Forensics</journal><volume>13</volume><journalNumber>6</journalNumber><paginationStart/><paginationEnd/><publisher>Inderscience Publishers</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>1751-911X</issnPrint><issnElectronic>1751-9128</issnElectronic><keywords/><publishedDay>28</publishedDay><publishedMonth>10</publishedMonth><publishedYear>2021</publishedYear><publishedDate>2021-10-28</publishedDate><doi>10.1504/ijesdf.2021.10036493</doi><url/><notes/><college>COLLEGE NANME</college><department>Social Sciences School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>SOSS</DepartmentCode><institution>Swansea University</institution><apcterm/><funders/><projectreference/><lastEdited>2024-10-18T09:59:40.3444407</lastEdited><Created>2020-10-12T10:15:57.2169832</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">Hilary Rodham Clinton School of Law</level></path><authors><author><firstname>Reza</firstname><surname>Montasari</surname><orcid>0000-0001-7136-6753</orcid><order>1</order></author><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>2</order></author><author><firstname>Amin Hosseinian</firstname><surname>Far</surname><order>3</order></author><author><firstname>Fiona</firstname><surname>Carroll</surname><order>4</order></author><author><firstname>Alireza</firstname><surname>Daneshkhah</surname><order>5</order></author></authors><documents><document><filename>55398__18403__8835ad9aeb5f47f29527ba8627cdc087.pdf</filename><originalFilename>Network and Hypervisor-Based Attacks.pdf</originalFilename><uploaded>2020-10-12T10:18:23.1642588</uploaded><type>Output</type><contentLength>753357</contentLength><contentType>application/pdf</contentType><version>Accepted Manuscript</version><cronfaStatus>true</cronfaStatus><embargoDate>2022-10-28T00:00:00.0000000</embargoDate><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents><OutputDurs/></rfc1807> |
spelling |
v2 55398 2020-10-12 Network and Hypervisor-Based Attacks in Cloud Computing Environments e420369ac98aaaa7f39248e39a847af1 0000-0001-7136-6753 Reza Montasari Reza Montasari true false 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 2020-10-12 SOSS Cloud Computing (CC) has become one of the most transformative computing technologies and a key business avenue, following in the footsteps of main-frames, minicomputers, personal computers, the World Wide Web and smartphones. Its vital features have considerably reduced IT costs, contributing to its rapid adoption by businesses and governments worldwide. Despite the many technological and economic benefits that CC offers, at the same time, it poses complex security threats resulting from the use of virtualisation technology. Compromising the security of any component in the cloud virtual infrastructure will negatively affect the security of other elements and so impact the overall system security. Therefore, to create a practical understanding of such threats, this paper provides an analysis of common and underexplored network- and hypervisor-based attacks against CC systems from a technical viewpoint. Journal Article International Journal of Electronic Security and Digital Forensics 13 6 Inderscience Publishers 1751-911X 1751-9128 28 10 2021 2021-10-28 10.1504/ijesdf.2021.10036493 COLLEGE NANME Social Sciences School COLLEGE CODE SOSS Swansea University 2024-10-18T09:59:40.3444407 2020-10-12T10:15:57.2169832 Faculty of Humanities and Social Sciences Hilary Rodham Clinton School of Law Reza Montasari 0000-0001-7136-6753 1 Stuart Macdonald 0000-0002-7483-9023 2 Amin Hosseinian Far 3 Fiona Carroll 4 Alireza Daneshkhah 5 55398__18403__8835ad9aeb5f47f29527ba8627cdc087.pdf Network and Hypervisor-Based Attacks.pdf 2020-10-12T10:18:23.1642588 Output 753357 application/pdf Accepted Manuscript true 2022-10-28T00:00:00.0000000 true eng |
title |
Network and Hypervisor-Based Attacks in Cloud Computing Environments |
spellingShingle |
Network and Hypervisor-Based Attacks in Cloud Computing Environments Reza Montasari Stuart Macdonald |
title_short |
Network and Hypervisor-Based Attacks in Cloud Computing Environments |
title_full |
Network and Hypervisor-Based Attacks in Cloud Computing Environments |
title_fullStr |
Network and Hypervisor-Based Attacks in Cloud Computing Environments |
title_full_unstemmed |
Network and Hypervisor-Based Attacks in Cloud Computing Environments |
title_sort |
Network and Hypervisor-Based Attacks in Cloud Computing Environments |
author_id_str_mv |
e420369ac98aaaa7f39248e39a847af1 933e714a4cc37c3ac12d4edc277f8f98 |
author_id_fullname_str_mv |
e420369ac98aaaa7f39248e39a847af1_***_Reza Montasari 933e714a4cc37c3ac12d4edc277f8f98_***_Stuart Macdonald |
author |
Reza Montasari Stuart Macdonald |
author2 |
Reza Montasari Stuart Macdonald Amin Hosseinian Far Fiona Carroll Alireza Daneshkhah |
format |
Journal article |
container_title |
International Journal of Electronic Security and Digital Forensics |
container_volume |
13 |
container_issue |
6 |
publishDate |
2021 |
institution |
Swansea University |
issn |
1751-911X 1751-9128 |
doi_str_mv |
10.1504/ijesdf.2021.10036493 |
publisher |
Inderscience Publishers |
college_str |
Faculty of Humanities and Social Sciences |
hierarchytype |
|
hierarchy_top_id |
facultyofhumanitiesandsocialsciences |
hierarchy_top_title |
Faculty of Humanities and Social Sciences |
hierarchy_parent_id |
facultyofhumanitiesandsocialsciences |
hierarchy_parent_title |
Faculty of Humanities and Social Sciences |
department_str |
Hilary Rodham Clinton School of Law{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}Hilary Rodham Clinton School of Law |
document_store_str |
1 |
active_str |
0 |
description |
Cloud Computing (CC) has become one of the most transformative computing technologies and a key business avenue, following in the footsteps of main-frames, minicomputers, personal computers, the World Wide Web and smartphones. Its vital features have considerably reduced IT costs, contributing to its rapid adoption by businesses and governments worldwide. Despite the many technological and economic benefits that CC offers, at the same time, it poses complex security threats resulting from the use of virtualisation technology. Compromising the security of any component in the cloud virtual infrastructure will negatively affect the security of other elements and so impact the overall system security. Therefore, to create a practical understanding of such threats, this paper provides an analysis of common and underexplored network- and hypervisor-based attacks against CC systems from a technical viewpoint. |
published_date |
2021-10-28T09:59:38Z |
_version_ |
1813241637378195456 |
score |
11.037319 |