A survey on securing the virtual cloud

被引:13
|
作者
Denz, Robert [1 ]
Taylor, Stephen [1 ]
机构
[1] Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA
关键词
Vulnerability amplifier; Malware prevention and detection; Secure virtual machine managers; Cloud resilience; Zero-day; Increasing attacker workload; Virtual machine; View comparison-based malware detection;
D O I
10.1186/2192-113X-2-17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper presents a survey and analysis of the current security measures implemented in cloud computing and the hypervisors that support it. The viability of an efficient virtualization layer has led to an explosive growth in the cloud computing industry, exemplified by Amazon's Elastic Cloud, Apple's iCloud, and Google's Cloud Platform. However, the growth of any sector in computing often leads to increased security risks. This paper explores these risks and the evolution of mitigation techniques in open source cloud computing. Unlike uniprocessor security, the use of a large number of nearly identical processors acts as a vulnerability amplifier: a single vulnerability being replicated thousands of times throughout the computing infrastructure. Currently, the community is employing a diverse set of techniques in response to the perceived risk. These include malware prevention and detection, secure virtual machine managers, and cloud resilience. Unfortunately, this approach results in a disjoint response based more on detection of known threats rather than mitigation of new or zero-day threats, which are often left undetected. An alternative way forward is to address this issue by leveraging the strengths from each technique in combination with a focus on increasing attacker workload. This approach would make malicious operation time consuming and deny persistence on mission time-scales. It could be accomplished by incorporating migration, non-determinism, and resilience into the fabric of virtualization.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] RestAssured: Securing Cloud Analytics
    Feder, Oshrit
    Gershinsky, Gidon
    Tsfadia, Eliad
    SYSTOR'18: PROCEEDINGS OF THE 11TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE, 2018, : 120 - 120
  • [22] Securing Data Provenance in the Cloud
    Asghar, Muhammad Rizwan
    Ion, Mihaela
    Russello, Giovanni
    Crispo, Bruno
    OPEN PROBLEMS IN NETWORK SECURITY, 2012, 7039 : 145 - 160
  • [23] Practical Methods for Securing the Cloud
    Amoroso, Edward G.
    IEEE CLOUD COMPUTING, 2014, 1 (01) : 28 - 38
  • [24] Securing Manufacturing Data in the Cloud
    Waurzyniak, Patrick
    MANUFACTURING ENGINEERING, 2016, 157 (01): : 69 - 77
  • [25] A Generalized method for Securing the Cloud
    Salimath, Nagesh
    Sheetlani, Jitendra
    2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 521 - 523
  • [26] Securing Virtual Machines from Anomalies using Program-Behavior Analysis in Cloud Environment
    Mishra, Preeti
    Pilli, Emmanuel S.
    Varadharajan, Vijay
    Tupakula, Udaya
    PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 991 - 998
  • [27] Securing and controlling data in the cloud
    Vormetric, United Kingdom
    Comput. Fraud Secur., 2012, 11 (16-20):
  • [28] Addressing the Challenges in Securing the Cloud
    Ahamed, Farhad
    Shahrestani, Seyed
    Ginige, Athula
    INNOVATION VISION 2020: SUSTAINABLE GROWTH, ENTREPRENEURSHIP, AND ECONOMIC DEVELOPMENT, VOLS 1-4, 2012, : 1467 - 1476
  • [29] A Survey of Virtual Machine Placement Techniques in a Cloud Data Center
    Usmani, Zoha
    Singh, Shailendra
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 491 - 498
  • [30] The storage of virtual machine disk image in cloud computing: A survey
    Zhao, Yuyan
    Chen, Haibao
    Zhao, Shenghui
    Wang, Yihong
    2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 263 - 267