From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models

被引:14
作者
Compastie, Maxime [1 ,2 ]
Badonnel, Remi [1 ]
Festor, Olivier [1 ]
He, Ruan [2 ]
机构
[1] Univ Lorraine, Loria, INRIA, CNRS, Campus Sci, F-54600 Villers Les Nancy, France
[2] Orange Labs, 44 Ave Republ, F-92320 Chatillon, France
关键词
Security management; System virtualization; OS-Level virtualization; Cloud infrastructures; Unikernel; ATTACKS; MEMORY;
D O I
10.1016/j.cose.2020.101905
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Virtualization methods and techniques play an important role in the development of cloud infrastructures and their services. They enable the decoupling of virtualized resources from the underlying hardware, and facilitate their sharing amongst multiple users. They contribute to the building of elaborated cloud services that are based on the instantiation and composition of these resources. Different models may support such a virtualization, including virtualization based on type-I and type-II hypervisors, OS-level virtualization, and unikernel virtualization. These virtualization models pose a large variety of security issues, but also offer new opportunities for the protection of cloud services. In this article, we describe and compare these virtualization models, in order to establish a reference architecture of cloud infrastructure. We then analyze the security issues related to these models from the reference architecture, by considering related vulnerabilities and attacks. Finally, we point out different recommendations with respect to the exploitation of these models for supporting cloud protection. (c) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:20
相关论文
共 105 条
  • [1] A modular package manager architecture
    Abate, Pietro
    Di Cosmo, Roberto
    Treinen, Ralf
    Zacchiroli, Stefano
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2013, 55 (02) : 459 - 474
  • [2] [Anonymous], 2011, Following the White Rabbit: Software attacks against Intel (R) VT-d technology
  • [3] [Anonymous], 2005, Understanding the Linux Kernel: From I/O Ports to Process Management
  • [4] [Anonymous], 2013, Queue, DOI DOI 10.1145/2557963.2566628
  • [5] [Anonymous], 2011, CWE SANS TOP 25 MOST
  • [6] Arnautov S, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P689
  • [7] DevOps: Introducing Infrastructure-as-Code
    Artac, Matej
    Borovsak, Tadej
    Di Nitto, Elisabetta
    Guerriero, Michele
    Tamburri, Damian Andrew
    [J]. PROCEEDINGS OF THE 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C 2017), 2017, : 497 - 498
  • [8] Bacs A., 2016, Proceedings of the 31st Annual ACM Symposium on Applied Computing, SAC '16, P2033
  • [9] Barham P., 2003, Operating Systems Review, V37, P164, DOI 10.1145/1165389.945462
  • [10] Barrere M., 2014, P 2014 IEEE NETWORK, P1, DOI 10.1109/NOMS.2014.6838309