Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

被引:11
|
作者
Barrowclough, John Patrick [1 ]
Asif, Rameez [1 ,2 ]
机构
[1] Edinburgh Napier Univ, Sch Comp, Ctr Distributed Comp Networks & Secur, Edinburgh EH10 5DT, Midlothian, Scotland
[2] Edinburgh Napier Univ, Cyber Acad, Edinburgh EH10 5DT, Midlothian, Scotland
关键词
ISSUES; CHALLENGES;
D O I
10.1155/2018/1681908
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a 'hypervisor' that may be attacked and user data can be compromised or hacked. In order to better define these threats to which a cloud hypervisor is exposed, we conducted an in-depth analysis and highlighted the security concerns of the cloud. We basically focused on the two particular issues, i.e., (a) data breaches and (b) weak authentication. For in-depth analysis, we have successfully demonstrated a fully functional private cloud infrastructure running on CloudStack for the software management and orchestrated a valid hack. We analyzed the popular open-source hypervisors, followed by an extensive study of the vulnerability reports associated with them. Based on our findings, we propose the characterization and countermeasures of hypervisor's vulnerabilities. These investigations can be used to understand the potential attack paths on cloud computing and Cloud-of-Things (CoT) applications and identify the vulnerabilities that enabled them.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Hardening Hypervisors against Vulnerabilities in Instruction Emulators
    Ishiguro, Kenta
    Kono, Kenji
    PROCEEDINGS OF THE 11TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2018), 2018,
  • [42] A survey of cybersecurity threats and countermeasures in the Indian financial sector
    Tiwari, Mohit
    Gandhar, Abhishek
    Gandhar, Shashi
    Kumar, Shashi Bhushan
    Rehalia, Arvind
    Priyadarshi, Prakhar
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2024, 45 (02): : 507 - 514
  • [43] A Survey on Security Threats and Countermeasures in IEEE Test Standards
    Valea, Emanuele
    Da Silva, Mathieu
    Di Natale, Giorgio
    Flottes, Marie-Lise
    Rouzeyre, Bruno
    IEEE DESIGN & TEST, 2019, 36 (03) : 95 - 116
  • [44] Cloud Security Threats and Solutions: A Survey
    Butt, Umer Ahmed
    Amin, Rashid
    Mehmood, Muhammad
    Aldabbas, Hamza
    Alharbi, Mafawez T.
    Albaqami, Nasser
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 128 (01) : 387 - 413
  • [45] Cloud Security Threats and Solutions: A Survey
    Umer Ahmed Butt
    Rashid Amin
    Muhammad Mehmood
    Hamza Aldabbas
    Mafawez T. Alharbi
    Nasser Albaqami
    Wireless Personal Communications, 2023, 128 : 387 - 413
  • [46] Systematic identification of threats in the cloud: A survey
    Hong, Jin B.
    Nhlabatsi, Armstrong
    Kim, Dong Seong
    Hussein, Alaa
    Fetais, Noora
    Khan, Khaled M.
    COMPUTER NETWORKS, 2019, 150 : 46 - 69
  • [47] HOW SECURE IS YOUR CLOUD: CLASSIFICATION OF SECURITY THREATS AND COUNTERMEASURES WITHIN CLOUD COMPUTING?
    Almotiri, Sultan H.
    Al Ghamdi, Mohammed A.
    Saeed, Atif
    Shahid, Muhammad
    Masood, Khalid
    Nagra, Arfan Ali
    Asif, Muhammad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (08): : 228 - 241
  • [48] THREATS AND COUNTERMEASURES
    ADAM, JA
    IEEE SPECTRUM, 1992, 29 (08) : 21 - 28
  • [49] A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures
    Swessi, Dorsaf
    Idoudi, Hanen
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (02) : 1557 - 1592
  • [50] A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT)
    Papaioannou, Maria
    Karageorgou, Marina
    Mantas, Georgios
    Sucasas, Victor
    Essop, Ismael
    Rodriguez, Jonathan
    Lymberopoulos, Dimitrios
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (06)