Full Paper View Go Back

Public and Private Cloud Security through Vulnerabilities Assessment of Virtual Machine

Prabhat Bisht1

  1. Scientist C, NIC, Chandigarh, Haryana, India.

Section:Review Paper, Product Type: Journal-Paper
Vol.11 , Issue.4 , pp.86-90, Aug-2023


Online published on Aug 31, 2023


Copyright © Prabhat Bisht . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Prabhat Bisht, “Public and Private Cloud Security through Vulnerabilities Assessment of Virtual Machine,” International Journal of Scientific Research in Computer Science and Engineering, Vol.11, Issue.4, pp.86-90, 2023.

MLA Style Citation: Prabhat Bisht "Public and Private Cloud Security through Vulnerabilities Assessment of Virtual Machine." International Journal of Scientific Research in Computer Science and Engineering 11.4 (2023): 86-90.

APA Style Citation: Prabhat Bisht, (2023). Public and Private Cloud Security through Vulnerabilities Assessment of Virtual Machine. International Journal of Scientific Research in Computer Science and Engineering, 11(4), 86-90.

BibTex Style Citation:
@article{Bisht_2023,
author = {Prabhat Bisht},
title = {Public and Private Cloud Security through Vulnerabilities Assessment of Virtual Machine},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {8 2023},
volume = {11},
Issue = {4},
month = {8},
year = {2023},
issn = {2347-2693},
pages = {86-90},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3215},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3215
TI - Public and Private Cloud Security through Vulnerabilities Assessment of Virtual Machine
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Prabhat Bisht
PY - 2023
DA - 2023/08/31
PB - IJCSE, Indore, INDIA
SP - 86-90
IS - 4
VL - 11
SN - 2347-2693
ER -

91 Views    79 Downloads    29 Downloads
  
  

Abstract :
Virtualization in cloud computing is one of the biggest milestones leading us to next generation web technology. Use of virtualization technology through virtual machines in cloud computing is rapidly growing and offering best opportunities for availability, reliability, elastically, throughput, scalability, efficiency, and flexibility. Research shows that over 70 percent of organizations are planning to adopt cloud oriented services through virtualization by the end of 2017. Most of the companies delayed adopting cloud virtualization services because of the security concerns or many adopted this technology before adopting advanced security measures. Virtualization is achieved through Virtual Machine (VM) in cloud, so security of virtual machines is a matter of great concern for cloud service provider or cloud service user. Vulnerable Virtual Machine (VM) is a biggest reason for threats, due to which organization valuable information can be compromised. This research paper focus on security of Virtual Machines through vulnerabilities assessment of Virtual Machines in Cloud.

Key-Words / Index Term :
Virtual Machine Environment (VME), Virtual Machine (VM), Transport Layer Security (TLS),Secure Shell (SSH), Data Encryption Standard (DES), File Transport Protocol (FTP),Secure Socket Layer (SSL), Remote Procedure Call (RPC).

References :
[1]. Peter M. Mell, Timothy Grance, “The NIST definition of cloud computing,” National Institute of Standards and Technology, Vol.1, Issue.1, pp.1-7, 2011.
[2]. Talwana Jonathan Charity, Gu Chun Hua ,”Resource Reliability using Fault Tolerance in Cloud Computing,” In the proceedings of the 2016 International Conference on Next Generation Computing Technologies-IEEE, India, 2016.
[3]. Fatima Shakeel, Seema Sharma, “Green Cloud Computing: A review on Efficiency of Data Centres and Virtualization of Servers,” In the proceeding of the 2017 International Conference on Computing, Communication and Automation –IEEE, India 2017.
[4] Shruti Sharma, Sharanjit Singh, Amardeep Singh, Ramanpreet Kaur, “Virtualization in Cloud Computing,” International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET) ,Vol.2, Issue.4, pp.2394-4099, 2016
[5] B. Grobauer, T. Walloschek, E. Stocker, "Understanding cloud computing vulnerabilities," IEEE Security & Privacy, Vol.9, Issue.2, pp.50-57, 2011.
[6] Zakira Inayat , Abdullah Gani , Nor Badrul Anuar , Shahid Anwar , Muhammad Khurram Khan ,”Cloud-Based Intrusion Detection and Response System Open Research Issues and Solution”, Arabian Journal of Science and Engineering, Vol.42, pp.399–423, 2017.
[7] Prabhat Bisht, Manmohan Singh Rauthan, “Machine Learning and Natural Language Processing Based Web Application Firewall for Mitigating Cyber Attacks in Cloud,” International Journal of Scientific Research in Computer Science and Engineering, Vol.11, Issue.3, pp.1-15, 2023.
[8] Prabhat Bisht , Manmohan Singh Rauthan , Raj Kishore Bisht , “Component based web application firewall for analyzing and defending SQL injection attack vectors” , International Journal of Recent Technology and Engineering, Vol.8, Issue.3, pp.4183–4190, 2019.
[9] Prabhat Bisht, Devesh Pant, Manmohan Singh Rauthan, “Analyzing and defending web application vulnerabilities through proposed security model in cloud computing”, International journal of science and technology graphic era university, Vol.6, Issue.2, pp.183-196, 2018.
[10] Shahil, U M and Deekshitha, Ms. and Anam M, Nuzha and Basthikodi, Mustafa, “DDOS Attacks in Cloud Computing and its Preventions”, JETIR- International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN: 2349-5162, May, Vol.6, Issue.5, pp.405-408, 2019.
[11] Christof Paar , “Hardware Trojans and Other Threats against Embedded Systems,” In the Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation