. . "Under such a scenario, if a study says that there is a 40% chance to identify the exact location of a particular virtual machine by just spending few dollars (essentially, taking advantage of the economics of public clouds) and there is a theoretical possibility to insert a rogue virtual machine to either keep a tab on what is happening on the victim VM (eaves dropping) or launch a malicious attac" . . .