Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent From XSS Attack

Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent From XSS Attack

Nitin Nagar, Ugrasen Suman
Copyright: © 2019 |Pages: 15
ISBN13: 9781522581765|ISBN10: 1522581766|EISBN13: 9781522581772
DOI: 10.4018/978-1-5225-8176-5.ch042
Cite Chapter Cite Chapter

MLA

Nagar, Nitin, and Ugrasen Suman. "Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent From XSS Attack." Cloud Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2019, pp. 824-838. https://doi.org/10.4018/978-1-5225-8176-5.ch042

APA

Nagar, N. & Suman, U. (2019). Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent From XSS Attack. In I. Management Association (Ed.), Cloud Security: Concepts, Methodologies, Tools, and Applications (pp. 824-838). IGI Global. https://doi.org/10.4018/978-1-5225-8176-5.ch042

Chicago

Nagar, Nitin, and Ugrasen Suman. "Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent From XSS Attack." In Cloud Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 824-838. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-8176-5.ch042

Export Reference

Mendeley
Favorite

Abstract

Cloud virtualization has created an enormous impact on IT and networking worlds. A cloud environment is built on virtualization technology. Virtualization and its exclusive architecture have numerous features and advantages over non-conventional virtual machines. However, these new uniqueness create new vulnerabilities and attacks on a virtualization based cloud system. Cross Site Scripting (XSS) is among the top cloud vulnerabilities, according to recent studies. This exposure occurs when a user uses the input from a cloud environment application without properly looking into them. This allows an attacker to execute malicious scripts in cloud. The scripts execute harmful actions when a user visits the exploited cloud. Current approaches to mitigate this problem, especially on effective detection of XSS vulnerabilities in the application or prevention of real-time XSS attacks. To address this problem, the survey of different vulnerability attacks on cloud virtualization performed and also presents a concept for the removal of XSS vulnerabilities to secure the cloud environment.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.