Figure 3From: A survey on securing the virtual cloud An example of a covert channel, where node A transfers information to node B, through the intermediary node C. Back to article page