Redirigiendo al acceso original de articulo en 22 segundos...
Inicio  /  Future Internet  /  Vol: 11 Par: 3 (2019)  /  Artículo
ARTÍCULO
TITULO

An Access Control Model for Preventing Virtual Machine Hopping Attack

Ying Dong and Zhou Lei    

Resumen

As a new type of service computing model, cloud computing provides various services through the Internet. Virtual machine (VM) hopping is a security issue often encountered in the virtualization layer. Once it occurs, it directly affects the reliability of the entire computing platform. Therefore, we have thoroughly studied the virtual machine hopping attack. In addition, we designed the access control model PVMH (Prevent VM hopping) to prevent VM hopping attacks based on the BLP model and the Biba model. Finally, we implemented the model on the Xen platform. The experiments demonstrate that our PVMH module succeeds in preventing VM hopping attack with acceptable loss to virtual machine performance.

 Artículos similares

       
 
Yogeswaranathan Kalyani, Liam Vorster, Rebecca Whetton and Rem Collier    
In the last decade, digital twin (DT) technology has received considerable attention across various domains, such as manufacturing, smart healthcare, and smart cities. The digital twin represents a digital representation of a physical entity, object, sys... ver más
Revista: Future Internet

 
Muhammad Umer Masood, Muhammad Rashid, Saif Haider, Iram Naz, Chaitanya B. Pande, Salim Heddam, Fahad Alshehri, Ismail Elkhrachy, Amimul Ahsan and Saad Sh. Sammen    
Groundwater is an important source of freshwater. At the same time, anthropogenic activities, in particular, industrialization, urbanization, population growth, and excessive application of fertilizers, are some of the major reasons for groundwater quali... ver más
Revista: Water

 
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota    
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num... ver más
Revista: Future Internet

 
Elham Al Qahtani, Yousra Javed, Sarah Tabassum, Lipsarani Sahoo and Mohamed Shehab    
User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of such tools allows users to encrypt confidential emails, as well as manage their access control using features such as the expiration time, disabling forwardi... ver más
Revista: Future Internet

 
Salman Ali AlQahtani    
With the advent of 5G networks, the demand for improved mobile broadband, massive machine-type communication, and ultra-reliable, low-latency communication has surged, enabling a wide array of new applications. A key enabling technology in 5G networks is... ver más
Revista: Future Internet