A survey on securing the virtual cloud

被引:13
|
作者
Denz, Robert [1 ]
Taylor, Stephen [1 ]
机构
[1] Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA
关键词
Vulnerability amplifier; Malware prevention and detection; Secure virtual machine managers; Cloud resilience; Zero-day; Increasing attacker workload; Virtual machine; View comparison-based malware detection;
D O I
10.1186/2192-113X-2-17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper presents a survey and analysis of the current security measures implemented in cloud computing and the hypervisors that support it. The viability of an efficient virtualization layer has led to an explosive growth in the cloud computing industry, exemplified by Amazon's Elastic Cloud, Apple's iCloud, and Google's Cloud Platform. However, the growth of any sector in computing often leads to increased security risks. This paper explores these risks and the evolution of mitigation techniques in open source cloud computing. Unlike uniprocessor security, the use of a large number of nearly identical processors acts as a vulnerability amplifier: a single vulnerability being replicated thousands of times throughout the computing infrastructure. Currently, the community is employing a diverse set of techniques in response to the perceived risk. These include malware prevention and detection, secure virtual machine managers, and cloud resilience. Unfortunately, this approach results in a disjoint response based more on detection of known threats rather than mitigation of new or zero-day threats, which are often left undetected. An alternative way forward is to address this issue by leveraging the strengths from each technique in combination with a focus on increasing attacker workload. This approach would make malicious operation time consuming and deny persistence on mission time-scales. It could be accomplished by incorporating migration, non-determinism, and resilience into the fabric of virtualization.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Survey on the Key Management for securing the Cloud
    Pradeep, K., V
    Vijayakumar, V.
    BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 115 - 121
  • [2] Securing Cryptographic Keys in the Cloud: A Survey
    AlBelooshi, Bushra
    Damiani, Ernesto
    Salah, Khaled
    Martin, Thomas
    IEEE CLOUD COMPUTING, 2016, 3 (04): : 42 - +
  • [3] Survey on securing data storage in the cloud
    Huang, Chun-Ting
    Huang, Lei
    Qin, Zhongyuan
    Yuan, Hang
    Zhou, Lan
    Varadharajan, Vijay
    Kuo, C. C. Jay
    APSIPA TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING, 2014, 3
  • [4] Securing Virtual Network Function (VNF) in telco cloud
    Ravichandran B.
    Journal of ICT Standardization, 2020, 8 (03): : 235 - 246
  • [5] Virtual Environments Testing as a Cloud Service: A Methodology for Protecting and Securing Virtual Infrastructures
    Benkhelifa, Elhadj
    Hani, Anoud Bani
    Welsh, Thomas
    Mthunzi, Siyakha
    Guegan, Chirine Ghedira
    IEEE ACCESS, 2019, 7 : 108660 - 108676
  • [6] Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
    Barrowclough, John Patrick
    Asif, Rameez
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [7] Securing Virtual Machine Images of Cloud by Encryption through Kerberos
    Islam, S. M. Neamul
    Rahman, Md Mahbubur
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 1074 - 1079
  • [8] Securing Virtual Machines on Cloud through Game Theory Approach
    Prabhakar, Kashish
    Dutta, Kaushik
    Jain, Rachana
    Sharma, Mayank
    Khatri, Sunil Kumar
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 859 - 863
  • [9] Securing Cloud Virtual Machine Image Using Ethereum Blockchain
    Basu, Srijita
    Karmakar, Sandip
    Bera, Debasish
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [10] A Survey of Cryptographic Approaches to Securing Big-Data Analytics in the Cloud
    Yakoubov, Sophia
    Gadepally, Vijay
    Schear, Nabil
    Shen, Emily
    Yerukhimovich, Arkady
    2014 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2014,