Security Assessment of Virtual Machines in Open Source Clouds

被引:0
|
作者
Donevski, Aleksandar [1 ]
Ristov, Sasko [1 ]
Gusev, Marjan [1 ]
机构
[1] Ss Cyril & Methodius Univ, Fac Informat Sci & Comp Engn, Skopje, North Macedonia
关键词
Cloud Computing; OpenStack Cloud; Security Assessment; Virtualization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A company security perimeter is impaired if virtual machines are migrated from on-premise to the cloud. Although cloud service providers (CSP) offer some security level to migrated virtual machines, mostly from outside the cloud, the cloud customer is challenged with newly raised security challenges due to multi-tenancy, i.e. the threat from other co-tenant virtual machines hosted inside the cloud. CSP also faces threats from all tenants in the cloud. Both CSP and the tenants can be compromised in case of vulnerability. In this paper we analyze virtual machine security threats that might occur by other tenants or outside the cloud. Also, we compare the security level that the most common open source clouds provide for a particular virtual machine. The security assessment is realized for virtual machines with different operating systems.
引用
收藏
页码:1094 / 1099
页数:6
相关论文
共 50 条
  • [21] Improving Reliability for Provisioning of Virtual Machines in Desktop Clouds
    Gomez, Carlos E.
    Chavarriaga, Jaime
    Tchernykh, Andrei
    Castro, Harold E.
    EURO-PAR 2019: PARALLEL PROCESSING WORKSHOPS, 2020, 11997 : 669 - 680
  • [22] Towards an efficient snapshot approach for virtual machines in clouds
    Li, Jianxin
    Zhang, Yangyang
    Zheng, Jingsheng
    Liu, Hanging
    Li, Bo
    Huai, Jinpeng
    INFORMATION SCIENCES, 2017, 379 : 3 - 22
  • [23] A Hybrid Approach for Scheduling Virtual Machines in Private Clouds
    Kurdi, Heba
    Alotaibi, Ebtehal T.
    9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 : 249 - +
  • [24] Consistent Offline Update of Suspended Virtual Machines in Clouds
    Kourai, Kenichi
    Shiota, Yuji
    IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 58 - 65
  • [25] Robots Security Assessment and Analysis Using Open-Source Tools
    Yankson, Benjamin
    Loucks, Tyler
    Sampson, Andrea
    Lojano, Chelsea
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 449 - 456
  • [26] VMBeam: Zero-copy Migration of Virtual Machines for Virtual IaaS Clouds
    Kourai, Kenichi
    Ooba, Hiroki
    PROCEEDINGS OF 2016 IEEE 35TH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2016, : 121 - 126
  • [27] Automatic Generation Of Virtual Machines For Security Training
    Sanchez, M.
    Lopez, G.
    Martinez, J. J.
    IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (06) : 2795 - 2800
  • [28] The MARKet for Open Source: An Intelligent Virtual Open Source Marketplace
    Bavota, Gabriele
    Ciemniewska, Alicja
    Chulani, Ilknur
    De Nigro, Antonio
    Di Penta, Massimiliano
    Galletti, Davide
    Galoppini, Roberto
    Gordon, Thomas F.
    Kedziora, Pawel
    Lener, Ilaria
    Torelli, Francesco
    Pratola, Roberto
    Pukacki, Juliusz
    Rebahi, Yacine
    Villalonga, Sergio Garcia
    2014 SOFTWARE EVOLUTION WEEK - IEEE CONFERENCE ON SOFTWARE MAINTENANCE, REENGINEERING, AND REVERSE ENGINEERING (CSMR-WCRE), 2014, : 399 - +
  • [29] On the security of open source software
    Payne, C
    INFORMATION SYSTEMS JOURNAL, 2002, 12 (01) : 61 - 78
  • [30] Is Open Source Security a Myth?
    Schryen, Guido
    COMMUNICATIONS OF THE ACM, 2011, 54 (05) : 130 - +