alexa Abstract | An Analysis on the Possibilities of Covert Transfers between Virtual Machines Clustered In Cloud Computing: Survey
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article Open Access

Abstract

Cloud Computing has emerged to be one of the fast growing technology with a lot of devices being part of the cloud. A lot of applications have been deployed into the cloud for use by different users ranging from business applications, gaming applications, educational applications, health applications and other scientific applications. As different hardware, software and services are being deployed to provide cloud computing also a great number of vulnerabilities, attacks and threats arise that becomes an issue to the integrity, confidentiality and availability of cloud computing. The paper Covert Transfer between Virtual Machines in Cloud Computing looks at how covert transfers may compromise the security measure placed for cloud computing. Covert Transfers cause information leaks that affect the integrity, availability and confidentiality of cloud computing resources. Although achieving 100% security is unrealistic we aim to propose countermeasures that would give a favorable cost/benefit analysis for the consumers and providers of the services. We shall look into some of the issues that may cause the covert transfers.

To read the full article Peer-reviewed Article PDF image

Author(s): Wilson Bakasa, Kudakwashe Zvarevashe, Nicholas N. Karekwaivanane

Keywords

cloud computing, covert transfers, virtual machines and security countermeasures., Scientific Computing

Share This Page

Additional Info

Loading
Loading Please wait..
 
 
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords