Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: 3 Things You Really Should Know About Other People’s Cloud VMs
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Uncategorized > 3 Things You Really Should Know About Other People’s Cloud VMs
Uncategorized

3 Things You Really Should Know About Other People’s Cloud VMs

CloudWedge
CloudWedge
4 Min Read
SHARE

other peoples VM

other peoples VM

The joys of using a virtual machine in the cloud are similar to those of living in an apartment. A condo (virtual machine) costs less than a house (your own server), and somebody else takes care of the apartment block (cloud server) as a whole and mowing the lawn. On the other hand apartment block drawbacks can include noisy neighbors, careless tenants, and burglars sneaking into the building to break into apartments from the inside. It turns out that multi-tenancies in cloud computing and physical accommodation have a lot in common.

The Noisy Neighbor Effect among VMs

More Read

Order-to-Cash Cycle for Revenue Recognition
Answers to Drive your Mobile Program
Are US Data Centers Too Outdated to Handle Current Needs?
Economist Research: Decision-Making in Turbulent Times
Vint Cerf of Google and Bob Gourley of CTOvision.com on CIO Talk Radio

Virtual machines each take a part of the overall resources available. They may be activated or deactivated at any time, consuming or releasing resources accordingly. This means potential and unforeseeable performance degradation for the other virtual machines. Processing power, main memory and disk input and output may all be affected. ‘Cache pollution’ may occur, in which one virtual machine loads data into a CPU cache unnecessarily, which can lead to the data of another virtual machine being kicked out, or rather, down to lower-level memory with reduced performance.

The Careless Tenant

Users who are lax on security may fall prey to account hijackers who then gain control of a user’s account and any associated VMs. If the resources (server, database or other) you are sharing with such users are fully secured, this situation may not have an impact on you. The hijacker should not be able to start tampering with or stealing other users’ data, including yours. The problem comes if you are both using the same multi-tenant database and the cloud provider has security problems. Kind of like the janitor leaving the back door to the apartment block permanently wedged open. In this case, a hijacker could possibly accomplish further data breaches with SQL injection attacks for example to penetrate the cloud server further and gain information on other users and their account credentials.

The Thief Next Door

By installing a VM next to yours on the same physical server, a cyber-thief could get into your VM too. The process is called side channel analysis. It is a complex undertaking and involves a hacker working to recover system cache data or electromagnetic imprints in the server of your use of the resources. With enough data, the hacker can begin to piece together information to start attacking your account and VMs. As a potential threat, side channel analysis has been discussed for some time. Experiments have shown that it is indeed possible to move from theory to practice. A team of scientists showed recently that it could crack the code to access another VM. The team installed its own VM on the same machine and took it in turns with the target VM to access the processor and system cache. After the target VM used the resources, the hacking VM went in to copy the cache contents where fragments of account credentials and encryption keys could be recovered each time. By picking a competent and conscientious cloud computing provider, you have a greater chance of avoiding all these phenomena. The provider should put safeguards in place to prevent such situations and make the virtual neighborhood safe for you and all your VMs.  

TAGGED:cloud computing
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

Edge Computing in IoT
Unique Capabilities of Edge Computing in IoT
Exclusive Internet of Things
Turning Geographic Data Into Competitive Advantage
The Rise of Location Intelligence: Turning Geographic Data Into Competitive Advantage
Big Data Exclusive
AI Recruitment Software Solution
The Best AI Recruitment Software Solution: Transforming Hiring with Smarter Tech
Artificial Intelligence Exclusive
real estate data
How Big Data Is Changes How We Buy and Sell Real Estate
Big Data Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

amazon use of big data
Big DataExclusiveSoftware

How Amazon Has Shaped the Big Data Landscape

6 Min Read

2011 Cloud & IT Disaster Recovery Statistics

4 Min Read

Splunk: Big Data Machine for Operational Intelligence

10 Min Read
cloud technology benefits for medical billing
Cloud Computing

Cloud Technology is the Future of Medical Billing Software

17 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?