A survey on securing the virtual cloud

被引:13
|
作者
Denz, Robert [1 ]
Taylor, Stephen [1 ]
机构
[1] Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2013年 / 2卷 / 01期
关键词
Vulnerability amplifier; Malware prevention and detection; Secure virtual machine managers; Cloud resilience; Zero-day; Increasing attacker workload; Virtual machine; View comparison-based malware detection;
D O I
10.1186/2192-113X-2-17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper presents a survey and analysis of the current security measures implemented in cloud computing and the hypervisors that support it. The viability of an efficient virtualization layer has led to an explosive growth in the cloud computing industry, exemplified by Amazon's Elastic Cloud, Apple's iCloud, and Google's Cloud Platform. However, the growth of any sector in computing often leads to increased security risks. This paper explores these risks and the evolution of mitigation techniques in open source cloud computing. Unlike uniprocessor security, the use of a large number of nearly identical processors acts as a vulnerability amplifier: a single vulnerability being replicated thousands of times throughout the computing infrastructure. Currently, the community is employing a diverse set of techniques in response to the perceived risk. These include malware prevention and detection, secure virtual machine managers, and cloud resilience. Unfortunately, this approach results in a disjoint response based more on detection of known threats rather than mitigation of new or zero-day threats, which are often left undetected. An alternative way forward is to address this issue by leveraging the strengths from each technique in combination with a focus on increasing attacker workload. This approach would make malicious operation time consuming and deny persistence on mission time-scales. It could be accomplished by incorporating migration, non-determinism, and resilience into the fabric of virtualization.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Load Balancing in Cloud Computing: Survey
    Pradhan, Arabinda
    Bisoy, Sukant Kishoro
    Mallick, Pradeep Kumar
    INNOVATION IN ELECTRICAL POWER ENGINEERING, COMMUNICATION, AND COMPUTING TECHNOLOGY, IEPCCT 2019, 2020, 630 : 99 - 111
  • [22] A survey on software aging and rejuvenation in the cloud
    Roberto Pietrantuono
    Stefano Russo
    Software Quality Journal, 2020, 28 : 7 - 38
  • [23] A survey on software aging and rejuvenation in the cloud
    Pietrantuono, Roberto
    Russo, Stefano
    SOFTWARE QUALITY JOURNAL, 2020, 28 (01) : 7 - 38
  • [24] A Survey on Live Virtual Machine Migration
    Sharma, Arsch
    Saxena, Ashu
    Nanmaran, Karthick
    2017 19TH UKSIM-AMSS INTERNATIONAL CONFERENCE ON MATHEMATICAL MODELLING & COMPUTER SIMULATION (UKSIM), 2017, : 187 - 192
  • [25] A Survey of Migration Mechanisms of Virtual Machines
    Medina, Violeta
    Manuel Garcia, Juan
    ACM COMPUTING SURVEYS, 2014, 46 (03)
  • [26] Multiple Virtual Machines Resource Scheduling for Cloud Computing
    Zhang, Weizhe
    He, Hui
    Chen, Gui
    Sun, Jilong
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (05): : 2089 - 2096
  • [27] Cloud Computing for The Virtual Comprehensive Management Platform Design
    Wang, Bing
    Zou, Yanling
    Wu, Qiman
    Guan, Zhongren
    ADVANCED COMPOSITE MATERIALS, PTS 1-3, 2012, 482-484 : 1520 - 1523
  • [28] A Lightweight Performance Measurement Framework for a Virtual Machine on Cloud
    Sushma, M.
    Niroop, R. S.
    Shetty, Jyothi
    2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 404 - 408
  • [29] Applications nature aware virtual machine provisioning in cloud
    Achar, Raghavendra
    Thilagam, P. Santhi
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2018, 27 (02) : 93 - 107
  • [30] A Novel Live Virtual Machine Migration Method in Cloud
    Huang, Feng
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING APPLICATIONS (CSEA 2015), 2015, : 271 - 274