Abstract
With the development and application of Cloud Computing, all kinds of products become available for public, but opportunity always along with challenge. Cloud security has become the key problem of restricting the development of cloud computing while we benefit from cloud computing. Virtualization technology is the foundation of cloud computing, its security mainly is cloud security. Covert channel is about information hiding which emphasis on the secret of communication. A malicious user on one virtual machine usually cannot relay secret data to other virtual machines without using explicit communication media due to shared resource between virtual machines. The paper has a deep research of covert channel in cloud computing environment. The channel is working well though experimental tests.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, H.: Research on the technology to enhance the credibility of cloud computing platform. Fudan University, p. 10 (2008)
Nance, K., Bishop, M., Hay, B.: Virtual machine introspection: observation or interference? IEEE Secur. Priv. 6(5), 32–37 (2008)
Wang, Y., Wu, J., Zeng, H.: The research on covert channel. J. Softw. 21(9), 2262–2288 (2010)
Ahsan, K., Kundur D.: Practical data hiding in TCP/IP. In: Proceedings of the ACM Wksp. Multimedia Security, pp. 1–8 (2002)
Aviram, A., Hu, S., Ford, B., Gummadi, R.: Determinating timing channels in compute clouds. In: CCSW ’10: Proceedings of the 2010 ACM workshop on Cloud Computing Security Workshop, pp. 103–108. ACM, New York (2010)
O’Reilly, Programming Amazon Web Services, 15 March 2008
Qin, S.: Analysis of covert channel in high security level operating system. J. Softw. 15(12), 1837–1849 (2004)
Acknowledgement
This research was supported by the Fundamental Research Funds for the Central Universities (FRF-TP-13-015A) and the Conjunction Project of Guangdong Province and Ministry of Education on integration of production, education and research (2012B091000052).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, Q., He, Q., Zhang, Y. (2014). A Covert Channel Bases on CPU Load in Cloud Computing. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_35
Download citation
DOI: https://doi.org/10.1007/978-3-662-43908-1_35
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43907-4
Online ISBN: 978-3-662-43908-1
eBook Packages: Computer ScienceComputer Science (R0)