Cross Virtual Machine Security: A Survey

被引:0
作者
Zirari, Khalid [1 ]
Idrissi, Hamza Kamal [1 ]
Bensaid, Hicham [1 ]
En-Nouaary, Abdeslam [1 ]
El-Yahyaoui, Ahmed [2 ]
机构
[1] CEDOC 2TI Inst Natl Postes & Telecommun INPT, Rabat, Morocco
[2] Mohammed V Univ Rabat, Rabat, Morocco
来源
DIGITAL TECHNOLOGIES AND APPLICATIONS, ICDTA 2022, VOL 1 | 2022年 / 454卷
关键词
Cross virtual machine security; Cloud computing; Virtualization; Hypervisor security; Cache-based side-channel attacks; ISSUES;
D O I
10.1007/978-3-031-01942-5_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing security has emerged as the most pressing problem on the globe. Moreover, hosting several machines in a single physical environment offer more flexibility and performance, especially with the emergence of modern concepts such as smart cities, IoT, and robotics. The benefits and advantages of virtualization technology are enormous. On the other hand, sharing resources such as network, CPU, and RAM by several tenants cause security vulnerability related to virtualization components or side-channel attacks that challenge those gains. The present paper highlights the virtualization technologies and their security issues and survey the critical vulnerabilities related to side-channel attacks.
引用
收藏
页码:190 / 199
页数:10
相关论文
共 25 条
[1]  
Ahmadi M.M., 2021, Side-Channel Attacks on RISC-V Processors: Current Progress, Challenges, and Opportunities
[2]  
Ainapure B.S., 2021, A Novel Approach to Prevent Cloud Infrastructure against Cache Attacks
[3]  
[Anonymous], 2017, Security aspects of virtualization about ENISA
[4]  
[Anonymous], 2018, INT C ADV COMP COMM
[5]   Security in hardware assisted virtualization for cloud computing-State of the art issues and challenges [J].
Asvija, B. ;
Eswari, R. ;
Bijoy, M. B. .
COMPUTER NETWORKS, 2019, 151 :68-92
[6]  
Choudhary A., 2017, A critical survey of live virtual machine migration techniques
[7]   From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models [J].
Compastie, Maxime ;
Badonnel, Remi ;
Festor, Olivier ;
He, Ruan .
COMPUTERS & SECURITY, 2020, 97
[8]  
Gupta I, 2020, J INF SCI ENG, V36, P993, DOI [10.6688/JISE.202009_36(5).0004, 10.6688/JISE.20200936(5).0004]
[9]  
Jaamoun A., 2021, Scramble Cache: An Efficient Cache Architecture for Randomized Set Permutation
[10]   Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling [J].
Liu, Li ;
Wang, An ;
Zang, WanYu ;
Yu, Meng ;
Xiao, Menbai ;
Chen, Songqing .
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 :491-511