Skip to content

Research at St Andrews

Investigation of Virtual Network Isolation security in Cloud computing: data leakage issues

Research output: Contribution to conferencePaper


Haifa Mohamed Khamis Al Nasseri, Ishbel Mary Macdonald Duncan

School/Research organisations


Software Defined Networking (SDN) or Virtual Networks (VNs) are required for cloud tenants to leverage demands. However, multi-tenancy can be compromised without proper isolation. Much research has been conducted into VN Isolation; many researchers are not tackling security aspects or checking if their isolation evaluation is complete. Therefore, data leakage is a major security worry in the cloud in general. This paper uses an OpenStack VN and OpenStack Tenant Network to test multi-tenancy features. We aim to evaluate the relationship between isolation methods used in cloud VN and the amount of data being leaked through using penetration tests. These tests will be used to identify the vulnerabilities causing cloud VN data leakage and to investigate how the vulnerabilities, and the leaked data, can compromise the tenant Virtual Networks.


Original languageEnglish
Number of pages4
Publication statusPublished - 10 May 2016
EventInternational Conference of Big Data in Cybersecurity - Napier Craiglockhart, Edinburgh, United Kingdom
Duration: 10 May 201610 May 2016


ConferenceInternational Conference of Big Data in Cybersecurity
CountryUnited Kingdom
Internet address

    Research areas

  • Cloud, Security, Virtual networks

Discover related content
Find related publications, people, projects and more using interactive charts.

View graph of relations

Related by author

  1. A novel method to prevent phishing by using OCR technology

    Wang, Y. & Duncan, I. M. M., 31 Oct 2019, 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE Computer Society, p. 1-5 5 p. 8885101

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Improving intrusion detection model prediction by threshold adaptation

    Al Tobi, A. M. H. & Duncan, I. M. M., 30 Apr 2019, In : Information. 10, 5, p. 1-42 42 p., 159.

    Research output: Contribution to journalArticle

  3. Human visual based perception of steganographic images

    Fyffe, B., Wang, Y. & Duncan, I., 2019, In : Journal of Cyber Security Technology. 3, 2, p. 61-107 47 p.

    Research output: Contribution to journalArticle

  4. KDD 1999 generation faults: a review and analysis

    Al Tobi, A. M. & Duncan, I., 2018, In : Journal of Cyber Security Technology. 2, 3-4, p. 164-200 37 p.

    Research output: Contribution to journalArticle

  5. Aerial Virtual Reality: Remote Tourism With Drones

    Fabola, A. E., Miller, A. & Duncan, I. M. M., Nov 2017.

    Research output: Contribution to conferencePaper

ID: 242951286