Paper Title
ADDRESSING CO-RESIDENCY ATTACKS IN CLOUD COMPUTING
Abstract
The cloud computing has gained a lot of attention over past few years, which is regarded as the next infrastructure for storing data and providing other services. Lot of famous companies, like Microsoft and Amazon, now provide such services and make benefits from that. Surprisingly, far away from high security as it should be, current cloud computing services are susceptible to attackers, since the physical resources are shared between VMs. Thus, the paper examined the vulnerabilities of deploying VMs in the third-party cloud compute service. The authors considered that the service provider is trusted and investigated the ways that a user can gain information about other users.The authors considered different scenarios and performed different experiments to find the physical machine of a given set of target VMs. Along with exposing threats, authors provided some mitigating techniques to at least make the jobs of attackers more difficult in the space.This paper is highly applicable as most of the experimentation laid out was done on the very popular Amazon AWS EC2 service. Although several techniques were used that applied exclusively to Amazon, it is easy to see how such strategies could be used on other cloud services, such as Google Cloud Platform, Rackspace, and Microsoft Azure.
Keywords - Vulnerabilities, Amazon EC2, Virtual Machine, Cloud Services, Third Party