Affiliation:
1. Devi Ahiliya University, India
Abstract
Cloud virtualization has created an enormous impact on IT and networking worlds. A cloud environment is built on virtualization technology. Virtualization and its exclusive architecture have numerous features and advantages over non-conventional virtual machines. However, these new uniqueness create new vulnerabilities and attacks on a virtualization based cloud system. Cross Site Scripting (XSS) is among the top cloud vulnerabilities, according to recent studies. This exposure occurs when a user uses the input from a cloud environment application without properly looking into them. This allows an attacker to execute malicious scripts in cloud. The scripts execute harmful actions when a user visits the exploited cloud. Current approaches to mitigate this problem, especially on effective detection of XSS vulnerabilities in the application or prevention of real-time XSS attacks. To address this problem, the survey of different vulnerability attacks on cloud virtualization performed and also presents a concept for the removal of XSS vulnerabilities to secure the cloud environment.
Reference27 articles.
1. Regular expressions considered harmful in client-side XSS filters
2. Boganatham, K. K. (2009). Server side API to secure XSS [Doctoral dissertation]. National Institute Of Technology Karnataka Surathkal.
3. Buyya, R., Garg, S. K., & Calheiros, R. N. (2011, December). SLA-oriented resource provisioning for cloud computing: Challenges, architecture, and solutions. Proceedings of the International Conference on Cloud and Service Computing CSC 2011 (pp. 1-10). IEEE.
4. Measuring CPU Overhead for I/O Processing in the Xen Virtual Machine Monitor.;L.Cherkasova;USENIX Annual Technical Conference, General Track,2005
5. Cloud security is not (just) virtualization security