Security in Multi-Tenancy Cloud

被引:34
|
作者
Jasti, Amarnath [1 ]
Shah, Payal [1 ]
Nagaraj, Rajeev [1 ]
Pendse, Ravi [1 ]
机构
[1] Wichita State Univ, Dept Elect Engn & Comp Sci, Wichita, KS 67260 USA
关键词
Cloud computing; Hypervisor; Virtualization; Virtual Machine (VM); multi-tenancy;
D O I
10.1109/CCST.2010.5678682
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing creates exciting opportunities like reduced costs and flexibility to the users. It also comprises of some risks like data security within the cloud. Several common security threats like data leakage, insecure API's, and malicious inside users are applicable to cloud computing environment as well. In this paper, the authors consider a cloud computing service where multiple Virtual Machines (VM's) are co-located on the same physical server. In such systems, physical resources are transparently shared by the VMs belonging to multiple users. In systems like these, a malicious user having control of a VM can try to gain control over other VM's resources or utilize all system resources leading to denial of resource attack over other VM users. A malicious user can also try to steal the data of other users located on the same server by compromising hypervisor file system (logical volumes). In this paper, security threats associated with cloud computing environment are evaluated. Authors also explore how such co-existent of VM's can be exploited to gain access over other user's data or deny service and propose constructive security measures that can be deployed to avoid such attacks.
引用
收藏
页码:35 / 41
页数:7
相关论文
共 50 条
  • [31] QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud
    Madi, Taous
    Zhang, Mengyuan
    Jarraya, Yosr
    Alimohammadifar, Amir
    Pourzandi, Makan
    Wang, Lingyu
    Debbabi, Mourad
    [J]. 2018 16TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2018), 2018, : 163 - 170
  • [32] Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments
    Ayache, Meryeme
    Erradi, Mohammed
    Freisleben, Bernd
    Khoumsi, Ahmed
    [J]. CCSW'16: PROCEEDINGS OF THE 2016 ACM CLOUD COMPUTING SECURITY WORKSHOP, 2016, : 55 - 59
  • [33] An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure
    Dey, Himel
    Islam, Rifat
    Arif, Hossain
    [J]. 2019 1ST INTERNATIONAL CONFERENCE ON ROBOTICS, ELECTRICAL AND SIGNAL PROCESSING TECHNIQUES (ICREST), 2019, : 502 - 506
  • [34] Improved scheduling of virtual machines on cloud with multi-tenancy and resource heterogeneity
    Khan, Adeel Ahmed
    Khan, Mohsin
    Ahmed, Waseem
    [J]. 2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 815 - 819
  • [35] Considering Service Name Indication for Multi-tenancy Routing in Cloud Environments
    Laskawiec, Sebastian
    Choras, Michal
    [J]. IMAGE PROCESSING AND COMMUNICATIONS CHALLENGES 8, 2017, 525 : 270 - 277
  • [36] Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach
    Kumar, Pawan
    Kumar Bhatt, Ashutosh
    [J]. IET COMMUNICATIONS, 2020, 14 (18) : 3212 - 3222
  • [37] Security Techniques for Multi Tenancy Applications in Cloud
    Nagarjuna
    Srinivas, C. C. Kalyan
    Sajida, S.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (08): : 80 - 83
  • [38] Multi-Tenancy Multi-Target (MT2): A SaaS Architecture for the Cloud
    Rico Ortega, Antonio
    Noguera, Manuel
    Luis Garrido, Jose
    Benghazi, Kawtar
    Chung, Lawrence
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, CAISE 2012, 2012, 112 : 214 - 227
  • [39] Multi-tenancy for Virtualized Network Functions
    Medhat, Ahmed M.
    Carella, Giuseppe
    Mwangama, Joyce
    Ventura, Neco
    [J]. 2015 1ST IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT), 2015,
  • [40] XBAC: A Unified Access Control Model for Heterogeneous Multi-Tenancy Cloud Environments
    Ayache, Meryeme
    Gawanmeh, Amjad
    Al-Karaki, Jamal N.
    [J]. 2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1872 - 1878