5 Security Concerns of Virtualization in Cloud Computing
Darshana A. Naik, G. Shruthi, A. Ashwitha, and Pramod Sunagar
M. S. Ramaiah Institute of Technology
CONTENTS
5.1 Introduction to Cloud Computing
5.2.3 Traditional Security Approaches to Virtualization
5.2.3.4 Hypervisor Vulnerabilities
5.2.3.5 Single Point of Failure
5.2.3.8 Cross-VM Side Channel Attack
5.2.3.9 Outdated SW Packages in VMs
5.2.4 Security Benefits Due to Virtualization
Get Privacy and Security Challenges in Cloud Computing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.