A survey on securing the virtual cloud

被引:13
|
作者
Denz, Robert [1 ]
Taylor, Stephen [1 ]
机构
[1] Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2013年 / 2卷 / 01期
关键词
Vulnerability amplifier; Malware prevention and detection; Secure virtual machine managers; Cloud resilience; Zero-day; Increasing attacker workload; Virtual machine; View comparison-based malware detection;
D O I
10.1186/2192-113X-2-17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper presents a survey and analysis of the current security measures implemented in cloud computing and the hypervisors that support it. The viability of an efficient virtualization layer has led to an explosive growth in the cloud computing industry, exemplified by Amazon's Elastic Cloud, Apple's iCloud, and Google's Cloud Platform. However, the growth of any sector in computing often leads to increased security risks. This paper explores these risks and the evolution of mitigation techniques in open source cloud computing. Unlike uniprocessor security, the use of a large number of nearly identical processors acts as a vulnerability amplifier: a single vulnerability being replicated thousands of times throughout the computing infrastructure. Currently, the community is employing a diverse set of techniques in response to the perceived risk. These include malware prevention and detection, secure virtual machine managers, and cloud resilience. Unfortunately, this approach results in a disjoint response based more on detection of known threats rather than mitigation of new or zero-day threats, which are often left undetected. An alternative way forward is to address this issue by leveraging the strengths from each technique in combination with a focus on increasing attacker workload. This approach would make malicious operation time consuming and deny persistence on mission time-scales. It could be accomplished by incorporating migration, non-determinism, and resilience into the fabric of virtualization.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Perspective of virtual machine consolidation in cloud computing: a systematic survey
    Zou, Junzhong
    Wang, Kai
    Zhang, Keke
    Kassim, Murizah
    TELECOMMUNICATION SYSTEMS, 2024, 87 (02) : 257 - 285
  • [2] A survey on load balancing algorithms for virtual machines placement in cloud computing
    Xu, Minxian
    Tian, Wenhong
    Buyya, Rajkumar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (12):
  • [3] Optimization of live virtual machine migration in cloud computing: A survey and future directions
    Noshy, Mostafa
    Ibrahim, Abdelhameed
    Ali, Hesham Arafat
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 110 : 1 - 10
  • [4] An Authentication Framework for Securing Virtual Machine Migration
    Majhi, Santosh Kumar
    Dhal, Sunil Kumar
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1283 - 1286
  • [5] Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing
    Rajendra Patil
    Harsha Dudeja
    Chirag Modi
    International Journal of Information Security, 2020, 19 : 147 - 162
  • [6] Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing
    Patil, Rajendra
    Dudeja, Harsha
    Modi, Chirag
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (02) : 147 - 162
  • [7] Literature Survey on Adaptive Virtual Machine Scheduling Strategy to Optimize Load Balancing in Cloud Environment
    Reddy, Hanuman N.
    Lathigara, Amit
    Aluvalu, Rajanikanth
    2021 INTERNATIONAL CONFERENCE ON DECISION AID SCIENCES AND APPLICATION (DASA), 2021,
  • [8] Allocation of Virtual Machines in Cloud Data Centers-A Survey of Problem Models and Optimization Algorithms
    Mann, Zoltan Adam
    ACM COMPUTING SURVEYS, 2015, 48 (01)
  • [9] Virtual Firewalling For Migrating Virtual Machines In Cloud Computing
    Anwar, Mahwish
    PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [10] Survey on cross virtual machine side channel attack detection and properties of cloud computing as sustainable material
    Narayana, K. E.
    Jayashree, K.
    MATERIALS TODAY-PROCEEDINGS, 2021, 45 : 6465 - 6470