Figure 2From: A survey on securing the virtual cloud The threat model, detailing the process from surveillance to exploitation in the cloud. Back to article page