A survey on securing the virtual cloud

被引:13
|
作者
Denz, Robert [1 ]
Taylor, Stephen [1 ]
机构
[1] Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA
关键词
Vulnerability amplifier; Malware prevention and detection; Secure virtual machine managers; Cloud resilience; Zero-day; Increasing attacker workload; Virtual machine; View comparison-based malware detection;
D O I
10.1186/2192-113X-2-17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper presents a survey and analysis of the current security measures implemented in cloud computing and the hypervisors that support it. The viability of an efficient virtualization layer has led to an explosive growth in the cloud computing industry, exemplified by Amazon's Elastic Cloud, Apple's iCloud, and Google's Cloud Platform. However, the growth of any sector in computing often leads to increased security risks. This paper explores these risks and the evolution of mitigation techniques in open source cloud computing. Unlike uniprocessor security, the use of a large number of nearly identical processors acts as a vulnerability amplifier: a single vulnerability being replicated thousands of times throughout the computing infrastructure. Currently, the community is employing a diverse set of techniques in response to the perceived risk. These include malware prevention and detection, secure virtual machine managers, and cloud resilience. Unfortunately, this approach results in a disjoint response based more on detection of known threats rather than mitigation of new or zero-day threats, which are often left undetected. An alternative way forward is to address this issue by leveraging the strengths from each technique in combination with a focus on increasing attacker workload. This approach would make malicious operation time consuming and deny persistence on mission time-scales. It could be accomplished by incorporating migration, non-determinism, and resilience into the fabric of virtualization.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] A Critical Survey of Virtual Machine Migration Techniques in Cloud Computing
    Bhagyalakshmi
    Malhotra, Deepti
    2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 328 - 332
  • [32] Perspective of virtual machine consolidation in cloud computing: a systematic survey
    Zou, Junzhong
    Wang, Kai
    Zhang, Keke
    Kassim, Murizah
    TELECOMMUNICATION SYSTEMS, 2024, 87 (02) : 257 - 285
  • [33] Survey on Secure Live Virtual Machine (VM) Migration in Cloud
    Ahmad, Naveed
    Kanwal, Ayesha
    Shibli, Muhammad Awais
    2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 101 - 106
  • [34] Securing the cloud: Cloud computer security techniques and tactics
    Brandon A Sullivan
    Security Journal, 2014, 27 : 338 - 340
  • [35] Securing the cloud: Cloud computer security techniques and tactics
    Sullivan, Brandon A.
    SECURITY JOURNAL, 2014, 27 (03) : 338 - 340
  • [36] Maintenance, securing the cloud and a pep talk
    Thinnes, Billy
    HYDROCARBON PROCESSING, 2011, 90 (03): : 15 - 15
  • [37] Securing Cloud Computing Through IT Governance
    Faizi, Salman M.
    Rahman, Shawon
    INFORMATION TECHNOLOGY IN INDUSTRY, 2019, 7 (01): : 1 - 14
  • [38] SECURING MULTI-CLOUD BY AUDITING
    Kumar, S. Naveen Vignesh
    Meenakshi, R.
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON SENSING, SIGNAL PROCESSING AND SECURITY (ICSSS), 2017, : 253 - 258
  • [39] Securing Cloud Infrastructure through PKI
    Ijaz, Imran
    Aslam, Abroo
    Bukhari, Bushra
    Javed, Rabia
    Anees, Sumaira
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [40] Securing Electronic Health Records in the Cloud
    Matos, David R.
    Pardal, Miguel L.
    Adao, Pedro
    Silva, Antonio Rito
    Correia, Miguel
    PROCEEDINGS OF THE WORKSHOP ON PRIVACY BY DESIGN IN DISTRIBUTED SYSTEMS (P2DS'18), 2015,