On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Cloud security issues and challenges: A survey

A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …

Security in cloud computing: Opportunities and challenges

M Ali, SU Khan, AV Vasilakos - Information sciences, 2015 - Elsevier
The cloud computing exhibits, remarkable potential to provide cost effective, easy to
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …

5G networks: Types of isolation and their parameters in RAN and CN slices

Z Kotulski, TW Nowak, M Sepczuk, MA Tunia - Computer Networks, 2020 - Elsevier
In this paper, we present a systematic overview of existing isolation techniques in nodes and
networks, especially in the Radio Access Network and the Core Network (RAN and CN) to …

Rust-Shyper: A reliable embedded hypervisor supporting VM migration and hypervisor live-update

C Mo, L Wang, S Li, K Hu, B Jiang - Journal of Systems Architecture, 2023 - Elsevier
Traditional embedded hypervisors usually focus on resource utilization and performance
while neglecting the reliability requirements. On the one hand, the reliability issues result …

Mycloud: supporting user-configured privacy protection in cloud computing

M Li, W Zang, K Bai, M Yu, P Liu - … of the 29th Annual Computer Security …, 2013 - dl.acm.org
Privacy concern is still one of the major issues that prevent users from moving to public
clouds. The root cause of the privacy problem is that the cloud provider has more privileges …

An exhaustive survey on security concerns and solutions at different components of virtualization

R Patil, C Modi - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Virtualization is a key enabler of various modern computing technologies. However, it brings
additional vulnerabilities that can be exploited to affect the availability, integrity, and …

An access control model for preventing virtual machine hop** attack

Y Dong, Z Lei - Future Internet, 2019 - mdpi.com
As a new type of service computing model, cloud computing provides various services
through the Internet. Virtual machine (VM) hop** is a security issue often encountered in …

Cloudoscopy: Services discovery and topology map**

A Herzberg, H Shulman, J Ullrich… - Proceedings of the 2013 …, 2013 - dl.acm.org
We define and study cloudoscopy, ie, exposing sensitive information about the location of
(victim) cloud services and/or about the internal organisation of the cloud network, in spite of …

Locally-centralized certificate validation and its application in desktop virtualization systems

B Li, J Lin, Q Wang, Z Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
To validate a certificate, a user needs to install the certificate of the root certification authority
(CA) and download the certificate revocation information (CRI). Although operating systems …