A survey on securing the virtual cloud

被引:13
作者
Denz, Robert [1 ]
Taylor, Stephen [1 ]
机构
[1] Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2013年 / 2卷 / 01期
关键词
Vulnerability amplifier; Malware prevention and detection; Secure virtual machine managers; Cloud resilience; Zero-day; Increasing attacker workload; Virtual machine; View comparison-based malware detection;
D O I
10.1186/2192-113X-2-17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper presents a survey and analysis of the current security measures implemented in cloud computing and the hypervisors that support it. The viability of an efficient virtualization layer has led to an explosive growth in the cloud computing industry, exemplified by Amazon's Elastic Cloud, Apple's iCloud, and Google's Cloud Platform. However, the growth of any sector in computing often leads to increased security risks. This paper explores these risks and the evolution of mitigation techniques in open source cloud computing. Unlike uniprocessor security, the use of a large number of nearly identical processors acts as a vulnerability amplifier: a single vulnerability being replicated thousands of times throughout the computing infrastructure. Currently, the community is employing a diverse set of techniques in response to the perceived risk. These include malware prevention and detection, secure virtual machine managers, and cloud resilience. Unfortunately, this approach results in a disjoint response based more on detection of known threats rather than mitigation of new or zero-day threats, which are often left undetected. An alternative way forward is to address this issue by leveraging the strengths from each technique in combination with a focus on increasing attacker workload. This approach would make malicious operation time consuming and deny persistence on mission time-scales. It could be accomplished by incorporating migration, non-determinism, and resilience into the fabric of virtualization.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Applications nature aware virtual machine provisioning in cloud
    Achar, Raghavendra
    Thilagam, P. Santhi
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2018, 27 (02) : 93 - 107
  • [42] Optimization of Virtual Resources Allocation in Cloud Computing Environment
    Akintoye, Samson B.
    Bagula, Antoine
    2017 IEEE AFRICON, 2017, : 873 - 880
  • [43] A survey and taxonomy of DoS attacks in cloud computing
    Masdari, Mohammad
    Jalali, Marzie
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3724 - 3751
  • [44] Survey of Analysis of Performance in Cloud Computing Environment
    Mishra, Abhishek
    Ali, Nashet
    Gupta, Avinash
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 572 - 577
  • [45] Multiple Virtual Machines Resource Scheduling for Cloud Computing
    Zhang, Weizhe
    He, Hui
    Chen, Gui
    Sun, Jilong
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (05): : 2089 - 2096
  • [46] Cloud Computing for The Virtual Comprehensive Management Platform Design
    Wang, Bing
    Zou, Yanling
    Wu, Qiman
    Guan, Zhongren
    ADVANCED COMPOSITE MATERIALS, PTS 1-3, 2012, 482-484 : 1520 - 1523
  • [47] A survey of live Virtual Machine migration techniques
    Tuan Le
    COMPUTER SCIENCE REVIEW, 2020, 38
  • [48] A Desirable Strategy for Resource Allocation using Virtual Machine in Cloud
    Abinaya, B.
    Suganthi, J.
    Kumar, R. G. Suresh
    Nalini, T.
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (05): : 25 - 30
  • [49] Security-Preserving Live Migration of Virtual Machines in the Cloud
    Fengzhe Zhang
    Haibo Chen
    Journal of Network and Systems Management, 2013, 21 : 562 - 587
  • [50] Security Issues Due to Vulnerabilities in the Virtual Machine of Cloud Computing
    Bhagat, Swapnil P.
    Patil, Vikram S.
    Meshram, Bandu B.
    INTELLIGENT COMPUTING AND COMMUNICATION, ICICC 2019, 2020, 1034 : 625 - 634