An Effective and Scalable VM Migration Strategy to Mitigate Cross-VM Side-Channel Attacks in Cloud

被引:0
|
作者
Yang, Chao [1 ]
Guo, Yunfei [1 ]
Hu, Hongchao [1 ]
Liu, Wenyan [1 ]
Wang, Yawen [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol Res Ct, Zhengzhou 450000, Peoples R China
基金
中国国家自然科学基金;
关键词
side-channel attacks; information leakage; virtual machine migration; genetic algorithm;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Co-residency of virtual machines (VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immediate deployment due to their requirement for modification of virtualization structure, we adopt dynamic migration, an inherent mechanism of the cloud platform, as a general defense against this kind of threats. To this end, we first set up a unified practical information leakage model which shows the factors affecting side channels and describes the way they influence the damage due to side-channel attacks. Since migration is adopted to limit the time duration of co-residency, we envision this defense as an optimization problem by setting up an Integer Linear Programming (ILP) to calculate optimal migration strategy, which is intractable due to high computational complexity. Therefore, we approximate the ILP with a baseline genetic algorithm, which is further improved for its optimality and scalability. Experimental results show that our migration-based defense can not only provide excellent security guarantees and affordable performance cost in both theoretical simulation and practical cloud environment, but also achieve better optimality and scalability than previous countermeasures.
引用
收藏
页码:151 / 171
页数:21
相关论文
共 50 条
  • [31] System and method for mitigating Cross VM attacks in Cloud Computing by securing the network traffic
    Kumar, Bhaskar
    Abhishek, Kumar
    Kumar, Abhay
    Singh, M. P.
    [J]. ISCAIE 2015 - 2015 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS, 2015, : 221 - 225
  • [32] Cross-Tenant Side-Channel Attacks in PaaS Clouds
    Zhang, Yinqian
    Juels, Ari
    Reiter, Michael K.
    Ristenpart, Thomas
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 990 - 1003
  • [33] Preventing Cache-Based Side-Channel Attacks in a Cloud Environment
    Godfrey, Michael
    Zulkernine, Mohammad
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (04) : 395 - 408
  • [34] Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications
    Zhang, Yuan
    Mao, Yunlong
    Xu, Minze
    Xu, Fengyuan
    Zhong, Sheng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1008 - 1018
  • [35] A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud
    Godfrey, Michael
    Zulkernine, Mohammad
    [J]. 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 163 - 170
  • [36] Guard Cache: Creating False Cache Hits and Misses To Mitigate Side-Channel Attacks
    Mosquera, Fernando
    Kavi, Krishna
    Mehta, Gayatri
    John, Lizy K.
    [J]. 2023 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC, 2023,
  • [37] Efficient side-channel attacks beyond divide-and-conquer strategy
    Jin, Shan
    Bettati, Riccardo
    [J]. COMPUTER NETWORKS, 2021, 198 (198)
  • [38] Shuffling Across Rounds: A Lightweight Strategy To Counter Side-channel Attacks
    Patranabis, Sikhar
    Roy, Debapriya Basu
    Vadnala, Praveen Kumar
    Mukhopadhyay, Debdeep
    Ghosh, Santosh
    [J]. PROCEEDINGS OF THE 34TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2016, : 440 - 443
  • [39] A Proactive Defense Strategy Against SGX Side-channel Attacks via self-checking DRL in the Cloud
    Ma, Tengchao
    Xu, Changqiao
    An, Qingzhao
    Kuang, Xiaohui
    Zhong, Lujie
    Grieco, Luigi Alfredo
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 4174 - 4179
  • [40] VM placement and cache based side channel attack at computational level in cloud computing : A Survey
    Hansraj
    Tiwari, Pradeep Kumar
    Chaudhary, Alka
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (05): : 1467 - 1473