Skip to main content

A Covert Channel Bases on CPU Load in Cloud Computing

  • Conference paper
  • First Online:
Trustworthy Computing and Services (ISCTCS 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 426))

Included in the following conference series:

  • 1200 Accesses

Abstract

With the development and application of Cloud Computing, all kinds of products become available for public, but opportunity always along with challenge. Cloud security has become the key problem of restricting the development of cloud computing while we benefit from cloud computing. Virtualization technology is the foundation of cloud computing, its security mainly is cloud security. Covert channel is about information hiding which emphasis on the secret of communication. A malicious user on one virtual machine usually cannot relay secret data to other virtual machines without using explicit communication media due to shared resource between virtual machines. The paper has a deep research of covert channel in cloud computing environment. The channel is working well though experimental tests.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, H.: Research on the technology to enhance the credibility of cloud computing platform. Fudan University, p. 10 (2008)

    Google Scholar 

  2. Nance, K., Bishop, M., Hay, B.: Virtual machine introspection: observation or interference? IEEE Secur. Priv. 6(5), 32–37 (2008)

    Article  Google Scholar 

  3. Wang, Y., Wu, J., Zeng, H.: The research on covert channel. J. Softw. 21(9), 2262–2288 (2010)

    Google Scholar 

  4. Ahsan, K., Kundur D.: Practical data hiding in TCP/IP. In: Proceedings of the ACM Wksp. Multimedia Security, pp. 1–8 (2002)

    Google Scholar 

  5. Aviram, A., Hu, S., Ford, B., Gummadi, R.: Determinating timing channels in compute clouds. In: CCSW ’10: Proceedings of the 2010 ACM workshop on Cloud Computing Security Workshop, pp. 103–108. ACM, New York (2010)

    Google Scholar 

  6. O’Reilly, Programming Amazon Web Services, 15 March 2008

    Google Scholar 

  7. Qin, S.: Analysis of covert channel in high security level operating system. J. Softw. 15(12), 1837–1849 (2004)

    Google Scholar 

Download references

Acknowledgement

This research was supported by the Fundamental Research Funds for the Central Universities (FRF-TP-13-015A) and the Conjunction Project of Guangdong Province and Ministry of Education on integration of production, education and research (2012B091000052).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qian Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, Q., He, Q., Zhang, Y. (2014). A Covert Channel Bases on CPU Load in Cloud Computing. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43908-1_35

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43907-4

  • Online ISBN: 978-3-662-43908-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics