A survey on securing the virtual cloud

被引:13
|
作者
Denz, Robert [1 ]
Taylor, Stephen [1 ]
机构
[1] Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA
关键词
Vulnerability amplifier; Malware prevention and detection; Secure virtual machine managers; Cloud resilience; Zero-day; Increasing attacker workload; Virtual machine; View comparison-based malware detection;
D O I
10.1186/2192-113X-2-17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper presents a survey and analysis of the current security measures implemented in cloud computing and the hypervisors that support it. The viability of an efficient virtualization layer has led to an explosive growth in the cloud computing industry, exemplified by Amazon's Elastic Cloud, Apple's iCloud, and Google's Cloud Platform. However, the growth of any sector in computing often leads to increased security risks. This paper explores these risks and the evolution of mitigation techniques in open source cloud computing. Unlike uniprocessor security, the use of a large number of nearly identical processors acts as a vulnerability amplifier: a single vulnerability being replicated thousands of times throughout the computing infrastructure. Currently, the community is employing a diverse set of techniques in response to the perceived risk. These include malware prevention and detection, secure virtual machine managers, and cloud resilience. Unfortunately, this approach results in a disjoint response based more on detection of known threats rather than mitigation of new or zero-day threats, which are often left undetected. An alternative way forward is to address this issue by leveraging the strengths from each technique in combination with a focus on increasing attacker workload. This approach would make malicious operation time consuming and deny persistence on mission time-scales. It could be accomplished by incorporating migration, non-determinism, and resilience into the fabric of virtualization.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Securing Services in Networked Cloud Infrastructures
    Varadharajan, Vijay
    Tupakula, Udaya
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (04) : 1149 - 1163
  • [42] Securing Resources in Decentralized Cloud Storage
    Bacis, Enrico
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Paraboschi, Stefano
    Rosa, Marco
    Samarati, Pierangela
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 286 - 298
  • [43] Securing Software Application Chains in a Cloud
    Kim, Donghoon
    Vouk, Mladen A.
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 50 - 53
  • [44] Securing personal data in public cloud
    Voros, Peter
    Csubak, Daniel
    Hudoba, Peter
    Kiss, Attila
    JOURNAL OF INFORMATION AND TELECOMMUNICATION, 2020, 4 (01) : 51 - 66
  • [45] New Approach for Securing Cloud Applications
    Kumar, N. Gowtham
    Polala, Niranjan
    Kumari, D. Aruna
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 689 - 693
  • [46] Security Policies for Securing Cloud Databases
    Buckley, Ingrid A.
    Wu, Fan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (06) : 33 - 36
  • [47] Security Model for Securing Data on Cloud
    Madni, Ahmad Fayyaz
    Shah, Munam Ali
    2022 17TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET'22), 2022, : 206 - 211
  • [48] A Survey on Algorithmic Aspects of Virtual Optical Network Embedding for Cloud Networks
    Davalos, Enrique J.
    Baran, Benjamin
    IEEE ACCESS, 2018, 6 : 20893 - 20906
  • [49] A survey on load balancing algorithms for virtual machines placement in cloud computing
    Xu, Minxian
    Tian, Wenhong
    Buyya, Rajkumar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (12):
  • [50] A Survey on the Use of Preferences for Virtual Machine Placement in Cloud Data Centers
    Alashaikh, Abdulaziz
    Alanazi, Eisa
    Al-Fuqaha, Ala
    ACM COMPUTING SURVEYS, 2021, 54 (05)