Reference Hub2
Cyber Security Aspects of Virtualization in Cloud Computing Environments: Analyzing Virtualization-Specific Cyber Security Risks

Cyber Security Aspects of Virtualization in Cloud Computing Environments: Analyzing Virtualization-Specific Cyber Security Risks

Darshan Mansukhbhai Tank, Akshai Aggarwal, Nirbhay Kumar Chaubey
Copyright: © 2020 |Pages: 17
ISBN13: 9781799822530|ISBN10: 1799822532|ISBN13 Softcover: 9781799822547|EISBN13: 9781799822554
DOI: 10.4018/978-1-7998-2253-0.ch013
Cite Chapter Cite Chapter

MLA

Tank, Darshan Mansukhbhai, et al. "Cyber Security Aspects of Virtualization in Cloud Computing Environments: Analyzing Virtualization-Specific Cyber Security Risks." Quantum Cryptography and the Future of Cyber Security, edited by Nirbhay Kumar Chaubey and Bhavesh B. Prajapati, IGI Global, 2020, pp. 283-299. https://doi.org/10.4018/978-1-7998-2253-0.ch013

APA

Tank, D. M., Aggarwal, A., & Chaubey, N. K. (2020). Cyber Security Aspects of Virtualization in Cloud Computing Environments: Analyzing Virtualization-Specific Cyber Security Risks. In N. Chaubey & B. Prajapati (Eds.), Quantum Cryptography and the Future of Cyber Security (pp. 283-299). IGI Global. https://doi.org/10.4018/978-1-7998-2253-0.ch013

Chicago

Tank, Darshan Mansukhbhai, Akshai Aggarwal, and Nirbhay Kumar Chaubey. "Cyber Security Aspects of Virtualization in Cloud Computing Environments: Analyzing Virtualization-Specific Cyber Security Risks." In Quantum Cryptography and the Future of Cyber Security, edited by Nirbhay Kumar Chaubey and Bhavesh B. Prajapati, 283-299. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2253-0.ch013

Export Reference

Mendeley
Favorite

Abstract

Cybercrime continues to emerge, with new threats surfacing every year. Every business, regardless of its size, is a potential target of cyber-attack. Cybersecurity in today's connected world is a key component of any establishment. Amidst known security threats in a virtualization environment, side-channel attacks (SCA) target most impressionable data and computations. SCA is flattering major security interests that need to be inspected from a new point of view. As a part of cybersecurity aspects, secured implementation of virtualization infrastructure is very much essential to ensure the overall security of the cloud computing environment. We require the most effective tools for threat detection, response, and reporting to safeguard business and customers from cyber-attacks. The objective of this chapter is to explore virtualization aspects of cybersecurity threats and solutions in the cloud computing environment. The authors also discuss the design of their novel ‘Flush+Flush' cache attack detection approach in a virtualized environment.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.