Security vulnerabilities from inside and outside the Eucalyptus cloud

  • Authors:
  • Marjan Gusev;Sasko Ristov;Aleksandar Donevski

  • Affiliations:
  • Ss. Cyril and Methodius University, Rugjer Boshkovikj, Skopje, FYR of Macedonia;Ss. Cyril and Methodius University, Rugjer Boshkovikj, Skopje, FYR of Macedonia;Ss. Cyril and Methodius University, Rugjer Boshkovikj, Skopje, FYR of Macedonia

  • Venue:
  • Proceedings of the 6th Balkan Conference in Informatics
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Cloud security becomes a hot topic in the emerging new cloud environments. Customers would like to understand what happens when they move their applications, data and information on the cloud. Probably one of the most interesting questions is what are the new challenges that cloud virtual environment produces due to multitenancy and virtualization. Security challenges addressed in this paper are vulnerabilities that may happen inside or outside the cloud environment. The security evaluation methodology uses Nessus scoring system for two target groups: physical and software parts using different scenarios. Our experiments are realized with four virtual machine instances instantiated in Eucalyptus cloud with different operating systems hosted. We also evaluate the security of the Eucalyptus cloud version.