Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

被引:11
|
作者
Barrowclough, John Patrick [1 ]
Asif, Rameez [1 ,2 ]
机构
[1] Edinburgh Napier Univ, Sch Comp, Ctr Distributed Comp Networks & Secur, Edinburgh EH10 5DT, Midlothian, Scotland
[2] Edinburgh Napier Univ, Cyber Acad, Edinburgh EH10 5DT, Midlothian, Scotland
关键词
ISSUES; CHALLENGES;
D O I
10.1155/2018/1681908
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a 'hypervisor' that may be attacked and user data can be compromised or hacked. In order to better define these threats to which a cloud hypervisor is exposed, we conducted an in-depth analysis and highlighted the security concerns of the cloud. We basically focused on the two particular issues, i.e., (a) data breaches and (b) weak authentication. For in-depth analysis, we have successfully demonstrated a fully functional private cloud infrastructure running on CloudStack for the software management and orchestrated a valid hack. We analyzed the popular open-source hypervisors, followed by an extensive study of the vulnerability reports associated with them. Based on our findings, we propose the characterization and countermeasures of hypervisor's vulnerabilities. These investigations can be used to understand the potential attack paths on cloud computing and Cloud-of-Things (CoT) applications and identify the vulnerabilities that enabled them.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Securing the Electric Vehicle Charging Infrastructure: An In-Depth Analysis of Vulnerabilities and Countermeasures
    Vailoces, Gerald
    Keith, Alexander
    Almehmadi, Abdulaziz
    El-Khatib, Khalil
    PROCEEDINGS OF THE INT'L ACM SYMPOSIUM ON DESIGN AND ANALYSIS OF INTELLIGENT VEHICULAR NETWORKS AND APPLICATIONS, DIVANET 2023, 2023, : 31 - 38
  • [32] A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures
    Obaidat, Muath A.
    Obeidat, Suhaib
    Holst, Jennifer
    Al Hayajneh, Abdullah
    Brown, Joseph
    COMPUTERS, 2020, 9 (02)
  • [33] A survey of common security vulnerabilities and corresponding countermeasures for SaaS
    Kim, Donghoon
    Vouk, Mladen A.
    2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 59 - 63
  • [34] Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures
    Hu, Yiwen
    Wang, Sihan
    Tu, Guan-Hua
    Xiao, Li
    Xie, Tian
    Lei, Xinyu
    Li, Chi-Yu
    PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 89 - 100
  • [35] Survey on the Key Management for securing the Cloud
    Pradeep, K., V
    Vijayakumar, V.
    BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 115 - 121
  • [36] Securing Cryptographic Keys in the Cloud: A Survey
    AlBelooshi, Bushra
    Damiani, Ernesto
    Salah, Khaled
    Martin, Thomas
    IEEE CLOUD COMPUTING, 2016, 3 (04): : 42 - +
  • [37] Survey on securing data storage in the cloud
    Huang, Chun-Ting
    Huang, Lei
    Qin, Zhongyuan
    Yuan, Hang
    Zhou, Lan
    Varadharajan, Vijay
    Kuo, C. C. Jay
    APSIPA TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING, 2014, 3
  • [38] A Survey: Security Threats and Countermeasures in Software Defined Networking
    Mubarakali, Azath
    Alqahtani, Abdulrahman Saad
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), 2019, : 180 - 185
  • [39] Survey of Cybersecurity Governance, Threats, and Countermeasures for the Power Grid
    Boeding, Matthew
    Boswell, Kelly
    Hempel, Michael
    Sharif, Hamid
    Lopez, Juan, Jr.
    Perumalla, Kalyan
    ENERGIES, 2022, 15 (22)
  • [40] Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures
    Tsiknas, Konstantinos
    Taketzis, Dimitrios
    Demertzis, Konstantinos
    Skianis, Charalabos
    IOT, 2021, 2 (01): : 163 - 186