Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

被引:11
|
作者
Barrowclough, John Patrick [1 ]
Asif, Rameez [1 ,2 ]
机构
[1] Edinburgh Napier Univ, Sch Comp, Ctr Distributed Comp Networks & Secur, Edinburgh EH10 5DT, Midlothian, Scotland
[2] Edinburgh Napier Univ, Cyber Acad, Edinburgh EH10 5DT, Midlothian, Scotland
关键词
ISSUES; CHALLENGES;
D O I
10.1155/2018/1681908
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a 'hypervisor' that may be attacked and user data can be compromised or hacked. In order to better define these threats to which a cloud hypervisor is exposed, we conducted an in-depth analysis and highlighted the security concerns of the cloud. We basically focused on the two particular issues, i.e., (a) data breaches and (b) weak authentication. For in-depth analysis, we have successfully demonstrated a fully functional private cloud infrastructure running on CloudStack for the software management and orchestrated a valid hack. We analyzed the popular open-source hypervisors, followed by an extensive study of the vulnerability reports associated with them. Based on our findings, we propose the characterization and countermeasures of hypervisor's vulnerabilities. These investigations can be used to understand the potential attack paths on cloud computing and Cloud-of-Things (CoT) applications and identify the vulnerabilities that enabled them.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] A Review of the Weaponization of IoT: Security Threats and Countermeasures
    Kulbacki, Marek
    Chaczko, Zenon
    Barton, Sophie
    Wajs-Chaczko, Peter
    Nikodem, Jan
    Rozenblit, Jerzy W.
    Klempous, Ryszard
    Ito, Atsushi
    Kulbacki, Michal
    18TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, SACI 2024, 2024, : 279 - 284
  • [22] Security of Topology Discovery Service in SDN: Vulnerabilities and Countermeasures
    Soltani, Sanaz
    Amanlou, Ali
    Shojafar, Mohammad
    Tafazolli, Rahim
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 3410 - 3450
  • [23] Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
    Yaacoub, Jean-Paul A.
    Noura, Hassan N.
    Salman, Ola
    Chehab, Ali
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (01) : 115 - 158
  • [24] Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and developing effective safeguard
    Pathak, Mayank
    Mishra, Kamta Nath
    Singh, Satya Prakash
    ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (10)
  • [25] SECURITY THREATS IN CLOUD COMPUTING
    Kajal, Neha
    Ikram, Nikhat
    Prachi
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 691 - 694
  • [26] Security Threats in Cloud Computing
    Gupta, Harsh
    Kumar, Deepak
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 1158 - 1162
  • [27] Security Threats, Countermeasures, and Challenges of Digital Supply Chains
    Hammi, Badis
    Zeadally, Sherali
    Nebhen, Jamel
    ACM COMPUTING SURVEYS, 2023, 55 (14S)
  • [28] Securing Cloud Computing Through IT Governance
    Faizi, Salman M.
    Rahman, Shawon
    INFORMATION TECHNOLOGY IN INDUSTRY, 2019, 7 (01): : 1 - 14
  • [29] Analysis of Cloud Computing Attacks and Countermeasures
    Jabir, Raja Mohamed
    Khanji, Salam Ismail Rasheed
    Ahmad, Liza Abdallah
    Alfandi, Omar
    Said, Huwida
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 117 - 123
  • [30] A Novel Agent-Based Framework in Bridge-Mode Hypervisors of Cloud Security
    Janbeglou, Maziar
    Yan, WeiQi
    7TH INTERNATIONAL CONFERENCE ON KNOWLEDGE MANAGEMENT IN ORGANIZATIONS: SERVICE AND CLOUD COMPUTING, 2013, 172 : 467 - 479