Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

被引:11
|
作者
Barrowclough, John Patrick [1 ]
Asif, Rameez [1 ,2 ]
机构
[1] Edinburgh Napier Univ, Sch Comp, Ctr Distributed Comp Networks & Secur, Edinburgh EH10 5DT, Midlothian, Scotland
[2] Edinburgh Napier Univ, Cyber Acad, Edinburgh EH10 5DT, Midlothian, Scotland
关键词
ISSUES; CHALLENGES;
D O I
10.1155/2018/1681908
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a 'hypervisor' that may be attacked and user data can be compromised or hacked. In order to better define these threats to which a cloud hypervisor is exposed, we conducted an in-depth analysis and highlighted the security concerns of the cloud. We basically focused on the two particular issues, i.e., (a) data breaches and (b) weak authentication. For in-depth analysis, we have successfully demonstrated a fully functional private cloud infrastructure running on CloudStack for the software management and orchestrated a valid hack. We analyzed the popular open-source hypervisors, followed by an extensive study of the vulnerability reports associated with them. Based on our findings, we propose the characterization and countermeasures of hypervisor's vulnerabilities. These investigations can be used to understand the potential attack paths on cloud computing and Cloud-of-Things (CoT) applications and identify the vulnerabilities that enabled them.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Securing Electric Vehicle Charging Stations: A Critical Analysis of Authentication Vulnerabilities
    Stichow, Andreas
    Rempel, Patrick
    32ND INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS, REW 2024, 2024, : 231 - 240
  • [32] Towards Securing Cloud & Information - Vision & Challenges
    Rawat, Abhinav
    Singhal, Akshat
    Choudhury, Tanupriya
    2021 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2021), 2021, : 220 - 226
  • [33] A Cloud Solution for Securing Medical Image Storage
    Marwan, Mbarek
    Temghart, Abdelkarim Ait
    Sifou, Fatima
    AlShahwan, Feda
    JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2020, 44 (01) : 113 - 139
  • [34] Operating Systems and Hypervisors for Network Functions: A Survey of Enabling Technologies and Research Studies
    Thyagaturu, Akhilesh S.
    Shantharama, Prateek
    Nasrallah, Ahmed
    Reisslein, Martin
    IEEE ACCESS, 2022, 10 : 79825 - 79873
  • [35] Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review
    Adeeb Mansoor Ansari
    Mohammed Nazir
    Khurram Mustafa
    Journal of Network and Systems Management, 2024, 32
  • [36] IoTVT Model: A Model Mapping IoT Sensors to IoT Vulnerabilities and Threats
    Nicho, Mathew
    Girija, Shini
    20TH INT CONF ON UBIQUITOUS COMP AND COMMUNICAT (IUCC) / 20TH INT CONF ON COMP AND INFORMATION TECHNOLOGY (CIT) / 4TH INT CONF ON DATA SCIENCE AND COMPUTATIONAL INTELLIGENCE (DSCI) / 11TH INT CONF ON SMART COMPUTING, NETWORKING, AND SERV (SMARTCNS), 2021, : 123 - 129
  • [37] A survey of emerging threats in cybersecurity
    Jang-Jaccard, Julian
    Nepal, Surya
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (05) : 973 - 993
  • [38] Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review
    Ansari, Adeeb Mansoor
    Nazir, Mohammed
    Mustafa, Khurram
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (02)
  • [39] A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective
    Abdul-Ghani, Hezam Akram
    Konstantas, Dimitri
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (02)
  • [40] Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks
    Giaretta, Alberto
    Balasubramaniam, Sasitharan
    Conti, Mauro
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 665 - 676