Dealing with rogue virtual machines in a cloud services environment
Colbert, B. and Batten, L.M. 2011, Dealing with rogue virtual machines in a cloud services environment, in CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, INSTICC, [Noordwijkerhout, The Netherlands], pp. 43-48.
(Some files may be inaccessible until you login with your Deakin Research Online credentials)
In current cloud services hosting solutions, various mechanisms have been developed to minimize the possibility of hosting staff from breaching security. However, while functions such as replicating and moving machines are legitimate actions in clouds, we show that there are risks in administrators being able to perform them. We describe three threat scenarios related to hosting staff on the cloud architecture and indicate how an appropriate accountability architecture can mitigate these risks in the sense that the attacks can be detected and the perpetrators identified. We identify requirements and future research and development needed to protect cloud service environments from these attacks.
Reproduced with the kind permission of the copyright owner.
Field of Research
080501 Distributed and Grid Systems
Socio Economic Objective
890301 Electronic Information Storage and Retrieval Services
Unless expressly stated otherwise, the copyright for items in Deakin Research Online is owned by the author, with all rights reserved.
Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO.
If you believe that your rights have been infringed by this repository, please contact email@example.com.