An Effective and Scalable VM Migration Strategy to Mitigate Cross-VM Side-Channel Attacks in Cloud

被引:0
|
作者
Yang, Chao [1 ]
Guo, Yunfei [1 ]
Hu, Hongchao [1 ]
Liu, Wenyan [1 ]
Wang, Yawen [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol Res Ct, Zhengzhou 450000, Peoples R China
基金
中国国家自然科学基金;
关键词
side-channel attacks; information leakage; virtual machine migration; genetic algorithm;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Co-residency of virtual machines (VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immediate deployment due to their requirement for modification of virtualization structure, we adopt dynamic migration, an inherent mechanism of the cloud platform, as a general defense against this kind of threats. To this end, we first set up a unified practical information leakage model which shows the factors affecting side channels and describes the way they influence the damage due to side-channel attacks. Since migration is adopted to limit the time duration of co-residency, we envision this defense as an optimization problem by setting up an Integer Linear Programming (ILP) to calculate optimal migration strategy, which is intractable due to high computational complexity. Therefore, we approximate the ILP with a baseline genetic algorithm, which is further improved for its optimality and scalability. Experimental results show that our migration-based defense can not only provide excellent security guarantees and affordable performance cost in both theoretical simulation and practical cloud environment, but also achieve better optimality and scalability than previous countermeasures.
引用
收藏
页码:151 / 171
页数:21
相关论文
共 50 条
  • [1] An Effective and Scalable VM Migration Strategy to Mitigate Cross-VM Side-Channel Attacks in Cloud
    Chao Yang
    Yunfei Guo
    Hongchao Hu
    Wenyan Liu
    Yawen Wang
    [J]. China Communications, 2019, 16 (04) : 151 - 171
  • [2] Cross-VM Covert- and Side-Channel Attacks in Cloud FPGAs
    Giechaskiel, Ilias
    Tian, Shanquan
    Szefer, Jakub
    [J]. ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2023, 16 (01)
  • [3] Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling
    Liu, Li
    Wang, An
    Zang, WanYu
    Yu, Meng
    Xiao, Menbai
    Chen, Songqing
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 491 - 511
  • [4] A Shared Memory based Cross-VM Side Channel Attacks in IaaS Cloud
    Wang, Ziqi
    Yang, Rui
    Fu, Xiao
    Du, Xiaojiang
    Luo, Bin
    [J]. 2016 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2016,
  • [5] Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks
    Cimato, Stelvio
    Damiani, Ernesto
    Mella, Silvia
    Yang, Ching-Nung
    [J]. CLOUD COMPUTING AND SECURITY, ICCCS 2016, PT I, 2016, 10039 : 456 - 467
  • [6] Mitigating Cross-VM Side Channel Attack on Multiple Tenants Cloud Platform
    Liu, Fei
    Ren, Lanfang
    Bai, Hongtao
    [J]. JOURNAL OF COMPUTERS, 2014, 9 (04) : 1005 - 1013
  • [7] Cross-VM Network Channel Attacks and Countermeasures Within Cloud Computing Environments
    Saeed, Atif
    Garraghan, Peter
    Hussain, Syed Asad
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1783 - 1794
  • [8] Cross-VM cache attacks on Camellia
    Milad Seddigh
    Hadi Soleimany
    [J]. Journal of Computer Virology and Hacking Techniques, 2022, 18 : 91 - 99
  • [9] Preventing from Cross-VM Side-Channel Attack Using New Replacement Method
    Saxena, Sandeep
    Sanyal, Goutam
    Srivastava, Shashank
    Amin, Ruhul
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (03) : 4827 - 4854
  • [10] Cross-VM Cache Attacks on AES
    Gulmezoglu, Berk
    Inci, Mehmet Sinan
    Irazoqui, Gorka
    Eisenbarth, Thomas
    Sunar, Berk
    [J]. IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2016, 2 (03): : 211 - 222