From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models

被引:14
作者
Compastie, Maxime [1 ,2 ]
Badonnel, Remi [1 ]
Festor, Olivier [1 ]
He, Ruan [2 ]
机构
[1] Univ Lorraine, Loria, INRIA, CNRS, Campus Sci, F-54600 Villers Les Nancy, France
[2] Orange Labs, 44 Ave Republ, F-92320 Chatillon, France
关键词
Security management; System virtualization; OS-Level virtualization; Cloud infrastructures; Unikernel; ATTACKS; MEMORY;
D O I
10.1016/j.cose.2020.101905
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Virtualization methods and techniques play an important role in the development of cloud infrastructures and their services. They enable the decoupling of virtualized resources from the underlying hardware, and facilitate their sharing amongst multiple users. They contribute to the building of elaborated cloud services that are based on the instantiation and composition of these resources. Different models may support such a virtualization, including virtualization based on type-I and type-II hypervisors, OS-level virtualization, and unikernel virtualization. These virtualization models pose a large variety of security issues, but also offer new opportunities for the protection of cloud services. In this article, we describe and compare these virtualization models, in order to establish a reference architecture of cloud infrastructure. We then analyze the security issues related to these models from the reference architecture, by considering related vulnerabilities and attacks. Finally, we point out different recommendations with respect to the exploitation of these models for supporting cloud protection. (c) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:20
相关论文
共 105 条
  • [41] Security in Multi-Tenancy Cloud
    Jasti, Amarnath
    Shah, Payal
    Nagaraj, Rajeev
    Pendse, Ravi
    [J]. 44TH ANNUAL 2010 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 2010, : 35 - 41
  • [42] Jiang XX, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P128
  • [43] Code-injection Vulnerabilities in Web Applications - Exemplified at Cross-site Scripting
    Johns, Martin
    [J]. IT-INFORMATION TECHNOLOGY, 2011, 53 (05): : 256 - 259
  • [44] SubVirt: Implementing malware with virtual machines
    King, Samuel T.
    Chen, Peter M.
    Wang, Yi-Min
    Verbowski, Chad
    Wang, Helen J.
    Lorch, Jacob R.
    [J]. 2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 314 - +
  • [45] Kivity Avi, 2007, P LIN S
  • [46] Klein G, 2009, SOSP'09: PROCEEDINGS OF THE TWENTY-SECOND ACM SIGOPS SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, P207
  • [47] Kocher P., 1999, Differential Power Analysis, P388, DOI DOI 10.1007/3-540-48405-1_25
  • [48] Kolyshkin K., 2006, CISC VIS NETW IND GL
  • [49] Kook Joongjin, 2011, P 2011 ACM S APPL CO, P633
  • [50] Kortchinsky K., 2009, CLOUDBURST