Secure virtual machine placement in cloud data centers

被引:28
作者
Agarwal, Amit [1 ]
Ta Nguyen Binh Duong [2 ]
机构
[1] BITS Pilani, Pilani, Goa, India
[2] Nanyang Technol Univ, SCSE, Singapore, Singapore
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 100卷
关键词
Data centers; Cloud security; Co-location attacks; Virtual machine placement; MANAGEMENT;
D O I
10.1016/j.future.2019.05.005
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to an increasing number of avenues for conducting cross-VM side-channel attacks, the security of multi-tenant public IaaS cloud environments is a growing concern. These attacks allow an adversary to steal private information from a target user whose VM instance is co-located with that of the adversary. In this paper, we focus on secure VM placement algorithms which a cloud provider can use for the automatic enforcement of security against such co-location based attacks. To do so, we first establish a metric for evaluating and quantifying co-location security of multi-tenant public IaaS clouds, and then propose a novel VM placement algorithm called "Previously Co-Located Users First" which aims to reduce the probability of malicious VM co-location. Thereafter, we perform a theoretical and empirical analysis of our proposed algorithm to evaluate its efficiency and security. Our results, obtained using real-world cloud traces containing millions of VM requests and thousands of actual users, indicate that the proposed algorithm provides a significant increase in the cloud's co-location resistance with little compromise in resource utilization, compared to existing approaches. We also explore the potential for cloud providers to leverage passive cache monitoring techniques as an additional security measure in order to automatically improve the co-location resistance provided by general VM placement algorithms. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:210 / 222
页数:13
相关论文
共 31 条
[1]  
Afoulki Zaina., 2011, A security-aware scheduler for virtual machines on iaas clouds. Report 2011
[2]  
Ahamed F., 2015, P 13 AUSTR S PAR DIS
[3]  
Alam M., PERFORMANCE COUNTERS
[4]  
[Anonymous], 2005, IACR Cryptology ePrint Archive
[5]  
[Anonymous], 2016, 2016 IEEEACM 24 INT
[6]  
[Anonymous], 2012, 21 USENIX SEC S USEN
[7]  
Azar Yossi., 2014, Proceedings of the ACM Workshop on Cloud Computing Security, P9
[8]   Co-location Resistant Strategy with Full Resources Optimization [J].
Berrima, Mouhebeddine ;
Nasr, Aicha Katajina ;
Ben Rajeb, Narjes .
CCSW'16: PROCEEDINGS OF THE 2016 ACM CLOUD COMPUTING SECURITY WORKSHOP, 2016, :3-10
[9]   Real time detection of cache-based side-channel attacks using hardware performance counters [J].
Chiappetta, Marco ;
Savas, Erkay ;
Yilmaz, Cemal .
APPLIED SOFT COMPUTING, 2016, 49 :1162-1174
[10]   Resource Central: Understanding and Predicting Workloads for Improved Resource Management in Large Cloud Platforms [J].
Cortez, Eli ;
Bonde, Anand ;
Muzio, Alexandre ;
Russinovich, Mark ;
Fontoura, Marcus ;
Bianchini, Ricardo .
PROCEEDINGS OF THE TWENTY-SIXTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '17), 2017, :153-167