Abstract

Modern cloud computing infrastructures use virtual machine monitors (VMMs) that often include a large and complex administrative domain with privileges to inspect client VM state. Attacks against or misuse of the administrative domain can compromise client security and privacy. Moreover, these VMMs provide clients inflexible control over their own VMs, as a result of which clients have to rely on the cloud provider to deploy useful services, such as VM introspection-based security tools.

Keywords:
Cloud computing Computer science Computer security Virtual machine Compromise Cloud computing security Domain (mathematical analysis) State (computer science) Operating system

Metrics

104
Cited By
15.16
FWCI (Field Weighted Citation Impact)
64
Refs
0.99
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Cloud Computing and Resource Management
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Self-service cloud computing

Butt, Shakeel

Journal:   Rutgers University Community Repository (Rutgers University) Year: 2015
BOOK-CHAPTER

Reflections on the Self-service Cloud Computing Project

Vinod Ganapathy

Lecture notes in computer science Year: 2015 Pages: 36-57
BOOK-CHAPTER

Cloud Computing and Cloud Service

Liping DiZiheng Sun

Encyclopedia of earth sciences series/Encyclopedia of earth sciences Year: 2021 Pages: 1-5
BOOK-CHAPTER

Cloud Computing and Cloud Service

Liping DiZiheng Sun

Encyclopedia of earth sciences series/Encyclopedia of earth sciences Year: 2023 Pages: 123-127
© 2026 ScienceGate Book Chapters — All rights reserved.