In a public cloud, multiple tenant share hardware and software resources. In IaaS model, if attackers can ensure their VMs to share the same resources with Hadoop’s VMs in a public cloud, they can launch various internal cloud attacks.
First, the threats can come from compromised hypervisors. Attackers can exploit vulnerabilities in hypervisors [7], [8], [9], [10], and use methods demonstrated by F. Rocha et al. [11] to obtain secret keys in Hadoop VM’s file system and memory.