Reference Hub11
Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent from XSS Attack

Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent from XSS Attack

Nitin Nagar, Ugrasen Suman
Copyright: © 2016 |Volume: 6 |Issue: 1 |Pages: 14
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781466693289|DOI: 10.4018/IJCAC.2016010101
Cite Article Cite Article

MLA

Nagar, Nitin, and Ugrasen Suman. "Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent from XSS Attack." IJCAC vol.6, no.1 2016: pp.1-14. http://doi.org/10.4018/IJCAC.2016010101

APA

Nagar, N. & Suman, U. (2016). Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent from XSS Attack. International Journal of Cloud Applications and Computing (IJCAC), 6(1), 1-14. http://doi.org/10.4018/IJCAC.2016010101

Chicago

Nagar, Nitin, and Ugrasen Suman. "Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent from XSS Attack," International Journal of Cloud Applications and Computing (IJCAC) 6, no.1: 1-14. http://doi.org/10.4018/IJCAC.2016010101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cloud virtualization has created an enormous impact on IT and networking worlds. A cloud environment is built on virtualization technology. Virtualization and its exclusive architecture have numerous features and advantages over non-conventional virtual machines. However, these new uniqueness create new vulnerabilities and attacks on a virtualization based cloud system. Cross Site Scripting (XSS) is among the top cloud vulnerabilities, according to recent studies. This exposure occurs when a user uses the input from a cloud environment application without properly looking into them. This allows an attacker to execute malicious scripts in cloud. The scripts execute harmful actions when a user visits the exploited cloud. Current approaches to mitigate this problem, especially on effective detection of XSS vulnerabilities in the application or prevention of real-time XSS attacks. To address this problem, the survey of different vulnerability attacks on cloud virtualization performed and also presents a concept for the removal of XSS vulnerabilities to secure the cloud environment.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.