Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

被引:11
|
作者
Barrowclough, John Patrick [1 ]
Asif, Rameez [1 ,2 ]
机构
[1] Edinburgh Napier Univ, Sch Comp, Ctr Distributed Comp Networks & Secur, Edinburgh EH10 5DT, Midlothian, Scotland
[2] Edinburgh Napier Univ, Cyber Acad, Edinburgh EH10 5DT, Midlothian, Scotland
关键词
ISSUES; CHALLENGES;
D O I
10.1155/2018/1681908
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a 'hypervisor' that may be attacked and user data can be compromised or hacked. In order to better define these threats to which a cloud hypervisor is exposed, we conducted an in-depth analysis and highlighted the security concerns of the cloud. We basically focused on the two particular issues, i.e., (a) data breaches and (b) weak authentication. For in-depth analysis, we have successfully demonstrated a fully functional private cloud infrastructure running on CloudStack for the software management and orchestrated a valid hack. We analyzed the popular open-source hypervisors, followed by an extensive study of the vulnerability reports associated with them. Based on our findings, we propose the characterization and countermeasures of hypervisor's vulnerabilities. These investigations can be used to understand the potential attack paths on cloud computing and Cloud-of-Things (CoT) applications and identify the vulnerabilities that enabled them.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
    Kumar, Rakesh
    Goyal, Rinkaj
    COMPUTER SCIENCE REVIEW, 2019, 33 : 1 - 48
  • [2] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art
    Pericherla, Suryateja S.
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (01): : 1 - 58
  • [3] A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures, and Challenges
    Tahirkheli, Abeer Iftikhar
    Shiraz, Muhammad
    Hayat, Bashir
    Idrees, Muhammad
    Sajid, Ahthasham
    Ullah, Rahat
    Ayub, Nasir
    Kim, Ki-Il
    ELECTRONICS, 2021, 10 (15)
  • [4] COMPUTER SECURITY - THREATS, VULNERABILITIES AND COUNTERMEASURES
    SMITH, M
    INFORMATION AGE, 1989, 11 (04): : 205 - 210
  • [5] Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities
    Dahbur, Kamal
    Mohammad, Bassil
    Tarakji, Ahmad Bisher
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2011, 1 (03) : 1 - 11
  • [6] A Survey on the Security of Hypervisors in Cloud Computing
    Riddle, Andrew R.
    Chung, Soon M.
    2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2015, : 100 - 104
  • [7] Wireless network security: Vulnerabilities, threats and countermeasures
    Choi, Min-Kyu
    Robles, Rosslin John
    Hong, Chang-Hwa
    Kim, Tai-Hoon
    International Journal of Multimedia and Ubiquitous Engineering, 2008, 3 (03): : 77 - 86
  • [8] Securing QoS: Threats to RSVP messages and their countermeasures
    Wu, TL
    Wu, SF
    Fu, Z
    Huang, H
    Gong, FM
    IWQOS '99: 1999 SEVENTH INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 1999, : 62 - 64
  • [9] Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems
    Almaiah, Mohammed Amin
    Saqr, Leen Mohammad
    Al-Rawwash, Leen Ahmad
    Altellawi, Layan Ahmed
    Al-Ali, Romel
    Almomani, Omar
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 81 (02): : 3189 - 3220
  • [10] Security Concerns in Smart Grids: Threats, Vulnerabilities and Countermeasures
    Khelifa, Benahmed
    Abla, Smahi
    PROCEEDINGS OF 2015 3RD IEEE INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC'15), 2015, : 772 - 777