Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: 3 Things You Really Should Know About Other People’s Cloud VMs
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Uncategorized > 3 Things You Really Should Know About Other People’s Cloud VMs
Uncategorized

3 Things You Really Should Know About Other People’s Cloud VMs

CloudWedge
CloudWedge
4 Min Read
SHARE

other peoples VM

other peoples VM

The joys of using a virtual machine in the cloud are similar to those of living in an apartment. A condo (virtual machine) costs less than a house (your own server), and somebody else takes care of the apartment block (cloud server) as a whole and mowing the lawn. On the other hand apartment block drawbacks can include noisy neighbors, careless tenants, and burglars sneaking into the building to break into apartments from the inside. It turns out that multi-tenancies in cloud computing and physical accommodation have a lot in common.

The Noisy Neighbor Effect among VMs

More Read

MDM and M&A
BYOD: Industry Experts Pick Their Top Advantages
Cloud Printing: the New Frontier for Cloud-Based Businesses
Missing! Results from the field of change management
Microsoft’s Dallas Copies BusinessObjects Information OnDemand

Virtual machines each take a part of the overall resources available. They may be activated or deactivated at any time, consuming or releasing resources accordingly. This means potential and unforeseeable performance degradation for the other virtual machines. Processing power, main memory and disk input and output may all be affected. ‘Cache pollution’ may occur, in which one virtual machine loads data into a CPU cache unnecessarily, which can lead to the data of another virtual machine being kicked out, or rather, down to lower-level memory with reduced performance.

The Careless Tenant

Users who are lax on security may fall prey to account hijackers who then gain control of a user’s account and any associated VMs. If the resources (server, database or other) you are sharing with such users are fully secured, this situation may not have an impact on you. The hijacker should not be able to start tampering with or stealing other users’ data, including yours. The problem comes if you are both using the same multi-tenant database and the cloud provider has security problems. Kind of like the janitor leaving the back door to the apartment block permanently wedged open. In this case, a hijacker could possibly accomplish further data breaches with SQL injection attacks for example to penetrate the cloud server further and gain information on other users and their account credentials.

The Thief Next Door

By installing a VM next to yours on the same physical server, a cyber-thief could get into your VM too. The process is called side channel analysis. It is a complex undertaking and involves a hacker working to recover system cache data or electromagnetic imprints in the server of your use of the resources. With enough data, the hacker can begin to piece together information to start attacking your account and VMs. As a potential threat, side channel analysis has been discussed for some time. Experiments have shown that it is indeed possible to move from theory to practice. A team of scientists showed recently that it could crack the code to access another VM. The team installed its own VM on the same machine and took it in turns with the target VM to access the processor and system cache. After the target VM used the resources, the hacking VM went in to copy the cache contents where fragments of account credentials and encryption keys could be recovered each time. By picking a competent and conscientious cloud computing provider, you have a greater chance of avoiding all these phenomena. The provider should put safeguards in place to prevent such situations and make the virtual neighborhood safe for you and all your VMs.  

TAGGED:cloud computing
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

protecting patient data
How to Protect Psychotherapy Data in a Digital Practice
Big Data Exclusive Security
data analytics
How Data Analytics Can Help You Construct A Financial Weather Map
Analytics Exclusive Infographic
AI use in payment methods
AI Shows How Payment Delays Disrupt Your Business
Artificial Intelligence Exclusive Infographic
financial analytics
Financial Analytics Shows The Hidden Cost Of Not Switching Systems
Analytics Exclusive Infographic

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

News from Washington: Teradata solutions for cloud computing and geospatial data

5 Min Read

Cloud Computing’s RAIC? What’s that?

31 Min Read

Google Apps: The Missing Manual

10 Min Read

The Rise of the Intercloud

5 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence
ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?