The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Background/Objectives: Cloud computing offers various services with minimum management effort while provisioning resources via internet. Cloud clients are allowed to store their personal data at data centers, it will minimize storage maintenance in local systems. Methods/Statistical Analysis: Cloud computing environment facing huge issues with hardware and software vulnerabilities in maintenance and resources provisioning process. These vulnerabilities pose huge loss of data, confidentiality, privacy and availability. Findings: In this paper, we studied and concentrated on various attacks in Virtualization environment and the possible attack scenarios in each platform. Application/Improvements: In the final section, we studied and described all types of attacks.

Keywords

Confidentiality, Integrity, Privacy, Provisioning, Virtualization.
User