Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Table 1 Mapping of VM’s life cycle threats and security solution [9]

From: Security transparency: the next frontier for security research in the cloud

Threats VM Life cycle stage Security solutions
NA Image definition NA
NA Image Creation NA
NA Image Customisation NA
Threats 4and 5 Transportation Cryptographic protection
Threats 1–5 Storage Cryptographic protection
Threats 1, 2, 3 and 5 Deployment Encrypted boot and data partition Custom binding
Threats 1-6 Contextualisation Custom binding
Threats 1, 3,4,5,6 and 7 Runtime Deviation from “normal”
Threats 2, 3 and 5 Undeployment VM introspection (VM memory consistency checks