Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

被引:11
|
作者
Barrowclough, John Patrick [1 ]
Asif, Rameez [1 ,2 ]
机构
[1] Edinburgh Napier Univ, Sch Comp, Ctr Distributed Comp Networks & Secur, Edinburgh EH10 5DT, Midlothian, Scotland
[2] Edinburgh Napier Univ, Cyber Acad, Edinburgh EH10 5DT, Midlothian, Scotland
关键词
ISSUES; CHALLENGES;
D O I
10.1155/2018/1681908
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a 'hypervisor' that may be attacked and user data can be compromised or hacked. In order to better define these threats to which a cloud hypervisor is exposed, we conducted an in-depth analysis and highlighted the security concerns of the cloud. We basically focused on the two particular issues, i.e., (a) data breaches and (b) weak authentication. For in-depth analysis, we have successfully demonstrated a fully functional private cloud infrastructure running on CloudStack for the software management and orchestrated a valid hack. We analyzed the popular open-source hypervisors, followed by an extensive study of the vulnerability reports associated with them. Based on our findings, we propose the characterization and countermeasures of hypervisor's vulnerabilities. These investigations can be used to understand the potential attack paths on cloud computing and Cloud-of-Things (CoT) applications and identify the vulnerabilities that enabled them.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] Security Vulnerabilities and Countermeasures of Smart Contracts: A Survey
    Sifra, Epherem Merete
    2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 512 - 515
  • [22] A survey on blockchain cybersecurity vulnerabilities and possible countermeasures
    Hasanova, Huru
    Baek, Ui-jun
    Shin, Mu-gon
    Cho, Kyunghee
    Kim, Myung-Sup
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2019, 29 (02)
  • [23] A Survey on Vulnerabilities and Countermeasures in the Communications of the Smart Grid
    Lazaro, Jesus
    Astarloa, Armando
    Rodriguez, Mikel
    Bidarte, Unai
    Jimenez, Jaime
    ELECTRONICS, 2021, 10 (16)
  • [24] Survey on smart homes: Vulnerabilities, risks, and countermeasures
    Hammi, Badis
    Zeadally, Sherali
    Khatoun, Rida
    Nebhen, Jamel
    COMPUTERS & SECURITY, 2022, 117
  • [25] Vulnerabilities, Challenges and Threats in Securing Mobile Ad-hoc Network
    Raj, Nawneet
    Bharti, Priyanka
    Thakur, Sanjeev
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 771 - 775
  • [26] A survey on securing the virtual cloud
    Denz, Robert
    Taylor, Stephen
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2013, 2 (01):
  • [27] Health IoT Threats: Survey of Risks and Vulnerabilities
    Madanian, Samaneh
    Chinbat, Tserendorj
    Subasinghage, Maduka
    Airehrour, David
    Hassandoust, Farkhondeh
    Yongchareon, Sira
    FUTURE INTERNET, 2024, 16 (11)
  • [28] An analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman
    AlZadjali, Amira M.
    Al-Badi, Ali H.
    Ali, Saqib
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 423 - 428
  • [29] A Systematic Review of Vulnerabilities in Hypervisors and Their Detection
    Litchfield, Alan
    Shahzad, Abid
    AMCIS 2017 PROCEEDINGS, 2017,
  • [30] Threats to Online Advertising and Countermeasures: A Technical Survey
    Cai, Yegui
    Yee, George O. M.
    Gu, Yuan Xiang
    Lung, Chung-Horng
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2020, 1 (02):