Security Assessment of Virtual Machines in Open Source Clouds

被引:0
|
作者
Donevski, Aleksandar [1 ]
Ristov, Sasko [1 ]
Gusev, Marjan [1 ]
机构
[1] Ss Cyril & Methodius Univ, Fac Informat Sci & Comp Engn, Skopje, North Macedonia
关键词
Cloud Computing; OpenStack Cloud; Security Assessment; Virtualization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A company security perimeter is impaired if virtual machines are migrated from on-premise to the cloud. Although cloud service providers (CSP) offer some security level to migrated virtual machines, mostly from outside the cloud, the cloud customer is challenged with newly raised security challenges due to multi-tenancy, i.e. the threat from other co-tenant virtual machines hosted inside the cloud. CSP also faces threats from all tenants in the cloud. Both CSP and the tenants can be compromised in case of vulnerability. In this paper we analyze virtual machine security threats that might occur by other tenants or outside the cloud. Also, we compare the security level that the most common open source clouds provide for a particular virtual machine. The security assessment is realized for virtual machines with different operating systems.
引用
收藏
页码:1094 / 1099
页数:6
相关论文
共 50 条
  • [41] CloudShelter: Protecting Virtual Machines' Memory Resource Availability in Clouds
    Zhang, Tianwei
    Xu, Yuan
    Bao, Yungang
    Lee, Ruby B.
    2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 557 - 564
  • [42] Virtual machines consolidation and placement based on constraint satisfaction in the clouds
    School of Mathematics and Computer Science, Wuhan Polytechnic University, Wuhan, China
    不详
    不详
    J. Comput. Inf. Syst., 14 (5251-5258):
  • [43] Securing Open Source Clouds Using Models
    Rauf, Irum
    Troubitsyna, Elena
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2018, (271): : 80 - 94
  • [44] Network Considerations for Open Source based Clouds
    Bakshi, Kapil
    2015 IEEE AEROSPACE CONFERENCE, 2015,
  • [45] OPEN SOURCE SOLUTIONS FOR BUILDING IAAS CLOUDS
    Barkat, Amine
    Dos Santos, Alysson Diniz
    Ikken, Sonia
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2015, 16 (02): : 187 - 204
  • [46] System Security Assessment Method Integrating Risk Relationships of Open Source Software
    Zhang, Hongbin
    Ren, Qingqing
    Liu, Bin
    Zhao, Dongmei
    Li, Ying
    Qi, Mingyue
    2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 21 - 27
  • [47] Implementation of the "Virtual Camber" Transformation into the Open Source Software QBlade: Validation and Assessment
    Bianchini, Alessandro
    Marten, David
    Tonini, Andrea
    Balduzzi, Francesco
    Nayeri, Christian Navid
    Ferrara, Giovanni
    Paschereit, Christian Oliver
    ATI 2018 - 73RD CONFERENCE OF THE ITALIAN THERMAL MACHINES ENGINEERING ASSOCIATION, 2018, 148 : 210 - 217
  • [48] On the Security of Python']Python Virtual Machines: An Empirical Study
    Lin, Xinrong
    Hua, Baojian
    Fan, Qiliang
    2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2022), 2022, : 223 - 234
  • [49] A Lightweight Security Isolation Approach for Virtual Machines Deployment
    Liang, Hongliang
    Han, Changyao
    Zhang, Daijie
    Wu, Dongyang
    INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 516 - 529
  • [50] Improving Security of Virtual Machines during Live Migrations
    Biedermann, Sebastian
    Zittel, Martin
    Katzenbeisser, Stefan
    2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 352 - 357