CryptVMI: Encrypted Virtual Machine Introspection in the Cloud

被引:2
|
作者
Yao, Fangzhou [1 ]
Campbell, Roy H. [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, Champaign, IL 61801 USA
关键词
D O I
10.1109/CLOUD.2014.149
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Virtualization techniques are the key in both public and private cloud computing environments. In such environments, multiple virtual instances are running on the same physical machine. The logical isolation between systems makes security assurance weaker than physically isolated systems. Thus, Virtual Machine Introspection techniques become essential to prevent the virtual system from being vulnerable to attacks. However, this technique breaks down the borders of the segregation between multiple tenants, which should be avoided in a public cloud computing environment. In this paper, we focus on building an encrypted Virtual Machine Introspection system, CryptVMI, to address the above concern, especially in a public cloud system. Our approach maintains a query handler on the management node to handle encrypted queries from user clients. We pass the query to the corresponding compute node that holds the virtual instance queried. The introspection application deployed on the compute node processes the query and acquires the encrypted results from the virtual instance for the user. This work shows our design and preliminary implementation of this system.
引用
收藏
页码:977 / 978
页数:2
相关论文
共 50 条
  • [41] Towards Hypervisor Support for Enhancing the Performance of Virtual Machine Introspection
    Taubmann, Benjamin
    Reiser, Hans P.
    [J]. DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, DAIS 2020, 2020, 12135 : 41 - 54
  • [42] Concurrent and Consistent Virtual Machine Introspection with Hardware Transactional Memory
    Liu, Yutao
    Xia, Yubin
    Guan, Haibing
    Zang, Binyu
    Chen, Haibo
    [J]. 2014 20TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA-20), 2014, : 416 - 427
  • [43] VMOffset: Semantic Reconstruction Improvement Method in Virtual Machine Introspection
    Chen, Xing-Shu
    Cai, Meng-Juan
    Wang, Wei
    Wang, Qi-Xu
    Jin, Xin
    [J]. Ruan Jian Xue Bao/Journal of Software, 2021, 32 (10): : 3293 - 3309
  • [44] Networking Introspection and Analysis for Virtual Machine Migration in Federated Clouds
    Andronico, Giuseppe
    Bua, Filippo
    Fargetta, Marco
    Giorgio, Emidio
    Guglielmo, Alessio
    Monforte, Salvatore
    Paone, Maurizio
    Villari, Massimo
    [J]. ADVANCES IN SERVICE-ORIENTED AND CLOUD COMPUTING (ESOCC 2015), 2016, 567 : 353 - 362
  • [45] Virtual Machine Forensics by Means of Introspection and Kernel Code Injection
    Tobin, Patrick
    Kechadi, Tahar
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 294 - 299
  • [46] Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection
    Proskurin, Sergej
    Lengyel, Tamas
    Momeu, Marius
    Eckert, Claudia
    Zarras, Apostolis
    [J]. 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 407 - 417
  • [47] Using Virtual Machine Introspection for Operating Systems Security Education
    Bhatt, Manish
    Ahmed, Irfan
    Lin, Zhiqiang
    [J]. SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, 2018, : 396 - 401
  • [48] Haskell Library for Safer Virtual Machine Introspection (Experience Report)
    Otsuka, Takato
    Iwasaki, Hideya
    [J]. PROCEEDINGS OF THE 16TH ACM SIGPLAN INTERNATIONAL SYMPOSIUM ON HASKELL, HASKELL 2023, 2023, : 89 - 96
  • [49] Active and passive virtual machine introspection on AMD and ARM processors
    Dangl, Thomas
    Sentanoe, Stewart
    Reiser, Hans P.
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 149
  • [50] Virtual Machine Introspection for Anomaly-Based Keylogger Detection
    Huseynov, Huseyn
    Kourai, Kenichi
    Saadawi, Tarek
    Igbe, Obinna
    [J]. 2020 IEEE 21ST INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2020,