Abstract
Data centers provides both the applications, systems software and the hardware as services over the Internet, which is named cloud computing [1-3]. It is core infrastructure of cloud computing, supporting dynamic deployment and elastic resource management. With the powerful computing and storing capabilities, cloud computing has become increasingly popular [4, 5]. The fundamental mechanism of cloud is virtualization which allows virtual machines (VM) instantiate stand-alone operating systems on demand based on a software layer called virtual machine monitor (VMM) or hypervisor [6]. Although the virtualization technology provides strong isolation for the cloud, security and privacy are always the open problems [7]. Some of the problems are essentially traditional web application and data-hosting ones, e.g., phishing, downtime, data loss, and password weakness. One of the new problems introduced by the shared environment to cloud computing is the covert channel attack [8]. By this way, information is leaked from the data centers and meanwhile the security provided by isolation is breaken down [9, 10].
Original language | English |
---|---|
Title of host publication | Handbook on Data Centers |
Publisher | Springer New York |
Pages | 961-996 |
Number of pages | 36 |
ISBN (Electronic) | 9781493920921 |
ISBN (Print) | 9781493920914 |
DOIs | |
Publication status | Published - 1 Jan 2015 |
Externally published | Yes |
Fingerprint
Keywords
- Architecture
- Control
- Covert channel
- Monitoring
- Security
- Software
ASJC Scopus subject areas
- Computer Science(all)
- Engineering(all)
Cite this
C2Hunter : Detection and mitigation of covert channels in data centers. / Wu, Jingzheng; Wu, Yanjun; Guan, Bei; Lin, Yuqi; Khan, Samee U.; Min-Allah, Nasro; Wang, Yongji.
Handbook on Data Centers. Springer New York, 2015. p. 961-996.Research output: Chapter in Book/Report/Conference proceeding › Chapter
}
TY - CHAP
T1 - C2Hunter
T2 - Detection and mitigation of covert channels in data centers
AU - Wu, Jingzheng
AU - Wu, Yanjun
AU - Guan, Bei
AU - Lin, Yuqi
AU - Khan, Samee U.
AU - Min-Allah, Nasro
AU - Wang, Yongji
PY - 2015/1/1
Y1 - 2015/1/1
N2 - Data centers provides both the applications, systems software and the hardware as services over the Internet, which is named cloud computing [1-3]. It is core infrastructure of cloud computing, supporting dynamic deployment and elastic resource management. With the powerful computing and storing capabilities, cloud computing has become increasingly popular [4, 5]. The fundamental mechanism of cloud is virtualization which allows virtual machines (VM) instantiate stand-alone operating systems on demand based on a software layer called virtual machine monitor (VMM) or hypervisor [6]. Although the virtualization technology provides strong isolation for the cloud, security and privacy are always the open problems [7]. Some of the problems are essentially traditional web application and data-hosting ones, e.g., phishing, downtime, data loss, and password weakness. One of the new problems introduced by the shared environment to cloud computing is the covert channel attack [8]. By this way, information is leaked from the data centers and meanwhile the security provided by isolation is breaken down [9, 10].
AB - Data centers provides both the applications, systems software and the hardware as services over the Internet, which is named cloud computing [1-3]. It is core infrastructure of cloud computing, supporting dynamic deployment and elastic resource management. With the powerful computing and storing capabilities, cloud computing has become increasingly popular [4, 5]. The fundamental mechanism of cloud is virtualization which allows virtual machines (VM) instantiate stand-alone operating systems on demand based on a software layer called virtual machine monitor (VMM) or hypervisor [6]. Although the virtualization technology provides strong isolation for the cloud, security and privacy are always the open problems [7]. Some of the problems are essentially traditional web application and data-hosting ones, e.g., phishing, downtime, data loss, and password weakness. One of the new problems introduced by the shared environment to cloud computing is the covert channel attack [8]. By this way, information is leaked from the data centers and meanwhile the security provided by isolation is breaken down [9, 10].
KW - Architecture
KW - Control
KW - Covert channel
KW - Monitoring
KW - Security
KW - Software
UR - http://www.scopus.com/inward/record.url?scp=84945122418&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84945122418&partnerID=8YFLogxK
U2 - 10.1007/978-1-4939-2092-1_32
DO - 10.1007/978-1-4939-2092-1_32
M3 - Chapter
AN - SCOPUS:84945122418
SN - 9781493920914
SP - 961
EP - 996
BT - Handbook on Data Centers
PB - Springer New York
ER -