Survey on covert channels in virtual machines and cloud computing

被引:16
|
作者
Betz, Johann [1 ]
Westhoff, Dirk [1 ]
Mueller, Guenter [2 ]
机构
[1] Hsch Offenburg Univ, Offenburg, Germany
[2] Univ Freiburg, Freiburg, Germany
关键词
STORAGE;
D O I
10.1002/ett.3134
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Covert channels have been known for a long time because of their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-) created or known methods have been adapted. For example, the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit as well as the L1 and L2 caches, which enable establishing multiple covert channels. Even virtualization, which is known for its isolation of multiple machines, is prone to covert- and side-channel attacks because of the sharing of resources. Therefore, it is not surprising that cloud computing is not immune to this kind of attacks. Moreover, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of illegitimate communication. In such a setting, the "air gap" between physical servers and networks disappears, and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand, we will provide a survey on vulnerable spots that an adversary could exploit trying to exfiltrate private data from target virtual machines through covert channels in a cloud environment. We will evaluate the feasibility of example attacks and point out proposed mitigation solutions in case they exist.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] On covert channels between virtual machines
    Ranjith, P.
    Priya, Chandran
    Shalini, Kaleeswaran
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2012, 8 (03): : 85 - 97
  • [2] Mapping Virtual Machines onto Physical Machines in Cloud Computing: A Survey
    Pietri, Ilia
    Sakellariou, Rizos
    [J]. ACM COMPUTING SURVEYS, 2016, 49 (03)
  • [3] A survey on load balancing algorithms for virtual machines placement in cloud computing
    Xu, Minxian
    Tian, Wenhong
    Buyya, Rajkumar
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (12):
  • [4] Virtual Firewalling For Migrating Virtual Machines In Cloud Computing
    Anwar, Mahwish
    [J]. PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [5] Efficient Distribution of Virtual Machines for Cloud Computing
    Schmidt, Matthias
    Fallenbeck, Niels
    Smith, Matthew
    Freisleben, Bernd
    [J]. PROCEEDINGS OF THE 18TH EUROMICRO CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, 2010, : 567 - 574
  • [6] Optimal Allocation of Virtual Machines in Cloud Computing
    Lin, Ming-Hua
    Tsai, Jung-Fa
    Hu, Yi-Chung
    Su, Tzu-Hsuan
    [J]. SYMMETRY-BASEL, 2018, 10 (12):
  • [7] Vulnerability Assessment for Virtual Machines in Virtual Environment of Cloud Computing
    Patil, Rajendra
    Modi, Chirag
    [J]. RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 569 - 576
  • [8] Improving cloud computing virtual machines balancing through hosts and virtual machines similarities
    Brascher, Gabriel Beims
    Weingartner, Rafael
    Westphall, Carlos Becker
    [J]. 2017 13TH IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2017, : 76 - 85
  • [9] Dynamic Creation of Virtual Machines in Cloud Computing Systems
    Luo, Fei
    Scherson, Isaac D.
    Fuentes, Joel
    [J]. 2017 25TH INTERNATIONAL CONFERENCE ON SYSTEMS ENGINEERING (ICSENG), 2017, : 316 - 323
  • [10] Multiple Virtual Machines Resource Scheduling for Cloud Computing
    Zhang, Weizhe
    He, Hui
    Chen, Gui
    Sun, Jilong
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (05): : 2089 - 2096