International Journal Of Engineering And Computer Science
Modern research has offered confirmation signifying how a malicious user could perform co-residence profiling and public-to-private IP mapping to target and exploit customers which share physical resources. Twp steps are relayed for this attack they are resource placement on the target's physical machine and extraction. In this paper, in part inspired by mussel self-organization, relies on user account and workload clustering to mitigate co-residence profiling. Users with similar preferences and workload characteristics are mapped to the same cluster. To obfuscate the public-to-private IP map, each cluster is managed and accessed by an account proxy.