From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models

被引:14
|
作者
Compastie, Maxime [1 ,2 ]
Badonnel, Remi [1 ]
Festor, Olivier [1 ]
He, Ruan [2 ]
机构
[1] Univ Lorraine, Loria, INRIA, CNRS, Campus Sci, F-54600 Villers Les Nancy, France
[2] Orange Labs, 44 Ave Republ, F-92320 Chatillon, France
关键词
Security management; System virtualization; OS-Level virtualization; Cloud infrastructures; Unikernel; ATTACKS; MEMORY;
D O I
10.1016/j.cose.2020.101905
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Virtualization methods and techniques play an important role in the development of cloud infrastructures and their services. They enable the decoupling of virtualized resources from the underlying hardware, and facilitate their sharing amongst multiple users. They contribute to the building of elaborated cloud services that are based on the instantiation and composition of these resources. Different models may support such a virtualization, including virtualization based on type-I and type-II hypervisors, OS-level virtualization, and unikernel virtualization. These virtualization models pose a large variety of security issues, but also offer new opportunities for the protection of cloud services. In this article, we describe and compare these virtualization models, in order to establish a reference architecture of cloud infrastructure. We then analyze the security issues related to these models from the reference architecture, by considering related vulnerabilities and attacks. Finally, we point out different recommendations with respect to the exploitation of these models for supporting cloud protection. (c) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:20
相关论文
共 26 条
  • [1] Cloud Virtualization with Data Security: Challenges and Opportunities
    Abraham, Joshua Johnson
    Sunny, Christy
    Assisi, Anlin
    Jayapandian, N.
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 865 - 872
  • [2] Virtualization Security Issues and Mitigations in Cloud Computing
    Krishna, S. Rama
    Rani, B. Padmaja
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 117 - 128
  • [3] Network Virtualization System for Security in Cloud Computing
    Ashalatha, R.
    Agarkhed, Jayashree
    Patil, Siddarama
    PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2017), 2017, : 346 - 350
  • [4] Cloud Security Analysis Based on Virtualization Technology
    Zhang, Jiaxing
    2022 INTERNATIONAL CONFERENCE ON BIG DATA, INFORMATION AND COMPUTER NETWORK (BDICN 2022), 2022, : 519 - 522
  • [5] Enhancing Security by System-Level Virtualization in Cloud Computing Environments
    Sun, Dawei
    Chang, Guiran
    Tan, Chunguang
    Wang, Xingwei
    INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT I, 2011, 134 (0I): : 565 - +
  • [6] Issues of Information Security Control in Virtualization Segment of Company Information System
    Mashkina, Irina V.
    Guzairov, Murat B.
    Vasilyev, Vladimir I.
    Tuliganova, Liliya R.
    Konovalov, Andrei S.
    PROCEEDINGS OF THE XIX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM 2016), 2016, : 161 - 163
  • [7] Security in hardware assisted virtualization for cloud computing-State of the art issues and challenges
    Asvija, B.
    Eswari, R.
    Bijoy, M. B.
    COMPUTER NETWORKS, 2019, 151 : 68 - 92
  • [8] An autonomous Cloud management system for in-depth security
    Bousquet, Aline
    Briffaut, Jeremy
    Toinard, Christian
    2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2014, : 368 - 374
  • [9] Security and Privacy Issues in Network Function Virtualization: A Review from Architectural Perspective
    Zahran, Bilal
    Ahmed, Naveed
    Alzoubaidi, Abdel Rahman
    Ngadi, Md Asri
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (06) : 475 - 480
  • [10] In-Depth Analysis of Cryptographic Algorithms for Cloud-Database Security
    Khan, Najeeb Ahmad
    Panchal, V. K.
    Tanweer, Safdar
    ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 27 - 41