All Questions
Tagged with virtualizationcloud-computing
17 questions
0votes
0answers
33views
secure deletion in virtual machines [duplicate]
when we securely delete a volume in a machine which is installed in a virtual machine or docker, for example by overwriting 7 times or more, we securely delete the data in virtual disk (in guest) and ...
2votes
1answer
210views
What are some attacks to consider in a cloud deployment? [duplicate]
I want to discuss the following scenario: I use a cloud provider like Amazon where every instance of the OS is a VM. The hypervisor launches the VMs as needed. So let's assume there are two VMs ...
0votes
2answers
870views
Privacy of client's virtual machine in cloud computing
As we know clients can create and run their virtual machines (VM)in the cloud computing. My question is about the confidentiality of data stored in the client's VM. Question 1: Does data stored in a ...
33votes
2answers
6kviews
How do big cloud providers guard against VM escape attacks?
I think it's pretty much unassailable to say that cloud computing as we know it depends on the concept of the robustness of virtual machines. Where one can depend on the security of VMs they allow ...
1vote
1answer
129views
Virtulization in cloud and security
From a security perspective, which type of hyper-visor cloud is more secure - one that runs on bare-metal (using minimal boot strap build into hyper-visor) or one which is loaded as a part of the OS ...
1vote
0answers
219views
How do I reduce the vulnerability of the OpenStack SSH key generation process? [closed]
I found two places that describe OpenStack SSH keys, but nothing seems to say whether or not they're generated on VMs. Generating these on the VMs could lead to problems, since VM images are often ...
1vote
2answers
1kviews
OpenVPN and running other services on same server
What security implications should I know about/look for when running OpenVPN on the same server as my network cloud controller and apt-cache-ng? I plan on using the same server to run apt-cacher-ng ...
2votes
1answer
419views
Will two virtual machines running on the same physical host machine get the same value from /dev/random?
Will two virtual machines running on the same physical host machine get the same value from /dev/random if read over the same time period? Say that Virtual-machine-1 wants to generate its ssh host ...
0votes
1answer
849views
Virtualization / Cloud-Stack fingerprinting from running VM
How can the host environment (not just the OS) be identified from a running guest VM. To determine what the underlying host and virtualization stacks being used actually are. I.e. whether there's a ...
3votes
0answers
131views
What are the steps to securing encryption keys/databases on an unsecured DAAS provider?
Most Desktop As A Service providers store their virtual hard drives and the VMs RAM in a way that allows them to access their contents. Choosing a provider who offers a 'no-knowledge of server' ...
0votes
1answer
155views
Performance issues while applying encryption at host or guest level?
One of the security expert here suggested me to apply encryption at guest(virtual machine) level rather than applying at host level with good reason. Before applying that I want to know what can be ...
0votes
1answer
719views
Which one is best, host or guest encryption?
Can anyone please tell me which option is better, I mean whether I should encrypt my data at virtual machine level or guest level in cloud? I tried to investigate it but did not find best solution so ...
3votes
1answer
596views
How are IaaS Virtual Machines Isolated?
I am currently examining Hypervisor firewalls for my graduate thesis, but I unfortunately don't have a lot of experience with IaaS environments. How are IaaS Virtual Machines network isolated from ...
4votes
5answers
6kviews
Building a Security Training Simulation environment
My university is keen to build a security training simulation environment/platform and it will be a good learning experience for students. I Googled around to find out how it is built, but I only ...
4votes
1answer
2kviews
VPS Safety in the Cloud
Imagine you are running a web server on a Virtual Private Server (VPS) hosted in a datacenter. Could the people running the datacenter covertly read files from my VPS's hard disk? Could an attacker ...