From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models

被引:14
作者
Compastie, Maxime [1 ,2 ]
Badonnel, Remi [1 ]
Festor, Olivier [1 ]
He, Ruan [2 ]
机构
[1] Univ Lorraine, Loria, INRIA, CNRS, Campus Sci, F-54600 Villers Les Nancy, France
[2] Orange Labs, 44 Ave Republ, F-92320 Chatillon, France
关键词
Security management; System virtualization; OS-Level virtualization; Cloud infrastructures; Unikernel; ATTACKS; MEMORY;
D O I
10.1016/j.cose.2020.101905
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Virtualization methods and techniques play an important role in the development of cloud infrastructures and their services. They enable the decoupling of virtualized resources from the underlying hardware, and facilitate their sharing amongst multiple users. They contribute to the building of elaborated cloud services that are based on the instantiation and composition of these resources. Different models may support such a virtualization, including virtualization based on type-I and type-II hypervisors, OS-level virtualization, and unikernel virtualization. These virtualization models pose a large variety of security issues, but also offer new opportunities for the protection of cloud services. In this article, we describe and compare these virtualization models, in order to establish a reference architecture of cloud infrastructure. We then analyze the security issues related to these models from the reference architecture, by considering related vulnerabilities and attacks. Finally, we point out different recommendations with respect to the exploitation of these models for supporting cloud protection. (c) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:20
相关论文
共 105 条
  • [31] Garfinkel T., 2003, P NETW DISTR SYST SE, P191
  • [32] Geffner J., 2018, VENOM VULNERABILITY
  • [33] Goel A., 2005, SOSP 05, P163
  • [34] Gu WN, 2003, 2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, P459
  • [35] Mining a high level access control policy in a network with multiple firewalls
    Hachana, Safaa
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 20 : 61 - 73
  • [36] HASTINGS R, 1991, PROCEEDINGS OF THE WINTER 1992 USENIX CONFERENCE, P125
  • [37] Heyens J., 2015, MONGODB DATABASES RI, P5
  • [38] GPU Virtualization and Scheduling Methods: A Comprehensive Survey
    Hong, Cheol-Ho
    Spence, Ivor
    Nikolopoulos, Dimitrios S.
    [J]. ACM COMPUTING SURVEYS, 2017, 50 (03)
  • [39] Horn J., 2017, PANDAVIRTUALIZATION
  • [40] Jaeger T, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P59