The communication in cloud environment takes place through the popular TCP/IP protocol that identifies the different cloud providers over the network through IP addresses. A VM (Virtual machine) in the Internet also has an IP address like a physical computer in the Internet. So, for a malicious user it is not a big deal to find this IP addresses. There is an easy way to implement a malicious virtual machine at the location of the physical server to initiate an attack. As a result, if the attacker can take the control over the VM, then all the legal users who use the same VM will be a victim of that.