Cyber Security Aspects of Virtualization in Cloud Computing Environments: Analyzing Virtualization-Specific Cyber Security Risks

Cyber Security Aspects of Virtualization in Cloud Computing Environments: Analyzing Virtualization-Specific Cyber Security Risks

Darshan Mansukhbhai Tank (Gujarat Technological University, Ahmedabad, India), Akshai Aggarwal (School of Computer Science, University of Windsor, Canada) and Nirbhay Kumar Chaubey (Gujarat Technological University, India)
Copyright: © 2020 |Pages: 17
DOI: 10.4018/978-1-7998-2253-0.ch013
OnDemand PDF Download:
No Current Special Offers


Cybercrime continues to emerge, with new threats surfacing every year. Every business, regardless of its size, is a potential target of cyber-attack. Cybersecurity in today's connected world is a key component of any establishment. Amidst known security threats in a virtualization environment, side-channel attacks (SCA) target most impressionable data and computations. SCA is flattering major security interests that need to be inspected from a new point of view. As a part of cybersecurity aspects, secured implementation of virtualization infrastructure is very much essential to ensure the overall security of the cloud computing environment. We require the most effective tools for threat detection, response, and reporting to safeguard business and customers from cyber-attacks. The objective of this chapter is to explore virtualization aspects of cybersecurity threats and solutions in the cloud computing environment. The authors also discuss the design of their novel ‘Flush+Flush' cache attack detection approach in a virtualized environment.
Chapter Preview


Cryptography can be defined as a technique of securing private messages by using codes so that only those for whom the message is destined can read and process it. It converts ordinary plain text into impenetrable text and vice-versa. The concept of cryptography has been widely used for secure communication in computer networks. Current cryptographic techniques may be easily defeated by increasing computing power and thus not likely to be more secure.

Quantum cryptography is gaining importance among IT security practitioners. The theory of quantum cryptography is becoming quite a sound day by day and its practical implementations are also grown-up regularly. The concept of quantum cryptography is formed on the basic principles of quantum mechanics. Quantum cryptography has the capability to make a remarkable contribution to personal, business, and e-commerce security. It has the strength to provide security among government organizations.

Over the past few years, cybercrimes have been growing up to become one of the most compelling threats across the world. Cybercrime can potentially disrupt, damage the business operations as well as commercial losses and compromise well-established reputation. Cyber-attacks evolve every day as attackers are becoming more inventive. Not only the number of security violations are rising, but they’re increasing in asperity, as well, leading to massive losses to businesses and organizations. In this section, we provide background information on quantum cryptography, cybercrime, and cyber-attacks in the context of cybersecurity.

Complete Chapter List

Search this Book: