Threat Modelling of Virtual Machine Migration Auction

被引:2
作者
Majhi, Santosh Kumar [1 ,2 ]
Dhal, Sunil Kumar [2 ]
机构
[1] Veer Surendra Sai Univ Technol, Odisha 768018, India
[2] Sri Sri Univ, Odisha, India
来源
1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015 | 2016年 / 78卷
关键词
Virtual Machine; Migration; Threats; Threat Modelling;
D O I
10.1016/j.procs.2016.02.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The auction process in Virtual Machine migration is a new concept to enhance the availability of the cloud resources by the business federation of Cloud Service Providers. In this process, the complete communication is performed over the Internet, which is in-secured. In addition, the VM auction is handled by the bidding module, which is a single application over the hypervisor. Though the hypervisor is carefully protected by available security techniques, we cannot ensure the security of the bidding module for this auction in VM migration. Before arguing the security of the VM migration auction system (VMMA), it is necessary to identify various threats to the system. Careful investigation enables the system administrator and its developer to build organized security requirements and protection mechanism. In this paper, we build a threat and security model for the VMMA system. The key components of the VMMA system are analyzed, and various possible threats are discussed. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:107 / 113
页数:7
相关论文
共 29 条
[1]  
Altmann J, 2008, LECT NOTES COMPUT SC, V5206, P185, DOI 10.1007/978-3-540-85485-2_15
[2]  
[Anonymous], P IEEE 22 ANN S FDN
[3]  
Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
[4]  
Bevan B., 2008, GUARDIAN NEWSPAPER
[5]  
Boughzala B., 2011, P IEEE IFIP WOCN
[6]  
Bradford R., 2007, P ACM VEE
[7]  
CCEB- Common Criteria Editorial Board, 1998, COMM CRIT INF TECHN
[8]  
Chen XQ, 2011, CHINA COMMUN, V8, P32
[9]  
Dandev B., 2011, P ACSAC
[10]  
Greenberg, 2009, P ACM SIGCOMM