With the widespread use of cloud computing, people pay more attention to the security of cloud platforms. For the case of some clouds, users are permitted to use the services, but they cannot communicate with each other in the same cloud. In this paper, we present a new kind of user-level covert channel which we called CCRCVM (Covert Channel using the Result of Creating a Virtual Machine). This covert channel exists in OpenStack, which we have confirmed. This covert channel takes advantage of the result of creating a virtual machine to make the users communicate. First of all, we describe the threat scenario of this covert channel. Then, we describe the theory and communication proceb of the covert channel. Afterwards, we implement the cove...
Critical Infrastructures (CIs) increasingly leverage Cloud computing given its benefits of on-demand...
Abstract- Cloud computing is a word that delivering hosted service over the internet. Cloud computin...
In order to protect user privacy or guarantee free access to the Internet, the network covert channe...
Covert channels have been known for a long time because of their versatile forms of appearance. For ...
Abstract—Privacy and information security in general are major concerns that impede enterprise adapt...
Covert channel between virtual machines is one of serious threats to cloud computing, since it will ...
Covert and Side-Channels have been known for a long time due to their versatile forms of appearance....
Recent exploration into the unique security challenges of cloud computing have shown that when virtu...
Abstract. Cloud computing relies on hypervisors to isolate virtual ma-chines running on shared hardw...
Frequently, it is believed that the adoption of encryption is adequate to ensure the safety of the m...
The improvement in performance gained by the use of multi-core processors led to security problem. I...
Abstract—Government and commercial enterprises are in-creasingly considering cloud adoption. Clouds ...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
AbstractThe rapid transition to cloud-based infrastructures has introduced a number of uncharted ris...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Critical Infrastructures (CIs) increasingly leverage Cloud computing given its benefits of on-demand...
Abstract- Cloud computing is a word that delivering hosted service over the internet. Cloud computin...
In order to protect user privacy or guarantee free access to the Internet, the network covert channe...
Covert channels have been known for a long time because of their versatile forms of appearance. For ...
Abstract—Privacy and information security in general are major concerns that impede enterprise adapt...
Covert channel between virtual machines is one of serious threats to cloud computing, since it will ...
Covert and Side-Channels have been known for a long time due to their versatile forms of appearance....
Recent exploration into the unique security challenges of cloud computing have shown that when virtu...
Abstract. Cloud computing relies on hypervisors to isolate virtual ma-chines running on shared hardw...
Frequently, it is believed that the adoption of encryption is adequate to ensure the safety of the m...
The improvement in performance gained by the use of multi-core processors led to security problem. I...
Abstract—Government and commercial enterprises are in-creasingly considering cloud adoption. Clouds ...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
AbstractThe rapid transition to cloud-based infrastructures has introduced a number of uncharted ris...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Critical Infrastructures (CIs) increasingly leverage Cloud computing given its benefits of on-demand...
Abstract- Cloud computing is a word that delivering hosted service over the internet. Cloud computin...
In order to protect user privacy or guarantee free access to the Internet, the network covert channe...