Data exchange is a core part of all cloud systems
so it becomes necessarily important to control access to data that are confidential and whose integrity influences the state of the system at any time.It can be proven that the administrator in a
IaaS can easily perform some hidden and malicious
task on unsuspecting customer machine. This is
attributed to the fact that he/she possesses the root
privilege to do so and forms an attack. A cold boot
attack can easily be lauched amongst other...