Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 6 SI
Page No. 9509 - 9518

Security Issues, Attacks and Vulnerabilities for Virtualization in Cloud Computing and their Solutions

Authors : Ahmed Ibrahim Turki, Alyaa Hasan Zwiad and Rafah M. Almuttairi

References

AlZadjali, A.M., A.H. Al-Badi and S. Ali, 2015. An analysis of the security threats and vulnerabilities of cloud computing in Oman. Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, September 2-4, 2015, IEEE, Taipei, Taiwan, pp: 423-428.

Almuttairi, R.M., M.K. Al-Anni and D.A. Aljburi, 2018. Implementing secure cluster using Hadoop and Snort for ID (intrusion detection). J. Eng. Appl. Sci., 3: 9789-9799.
CrossRef  |  Direct Link  |  

Bahram, S., X. Jiang, Z. Wang, M. Grace and J. Li et al., 2010. DKSM: Subverting virtual machine introspection for fun and profit. Proceedings of the 2010 29th IEEE Symposium on Reliable Distributed Systems, October 31-November 3, 2010, IEEE, New Delhi, India, ISBN:978-0-7695-4250-8, pp: 82-91.

Berger, S., R. Caceres, K. Goldman, D. Pendarakis and R. Perez et al., 2009. Security for the cloud infrastructure: Trusted virtual data center implementation. IBM. J. Res. Dev., 53: 1-12.
CrossRef  |  Direct Link  |  

Dawoud, W., I. Takouna and C. Meinel, 2010. Infrastructure as a service security: Challenges and solutions. Proceedings of the 7th International Conference on Informatics and Systems, March 28-30, 2010, Cairo, Egypt, pp: 1-8.

Ertaul, L., S. Singhal and G. Saldamli, 2010. Security challenges in cloud computing. Proceedings of the International Conference on Security and Management SAM’10, July 12-15, 2010, CSREA Press, Las Vegas, USA., pp: 36-42.

Fernandes, D.A., L.F. Soares, J.V. Gomes, M.M. Freire and P.R. Inacio, 2014. Security issues in cloud environments: A survey. Int. J. Inf. Secur., 13: 113-170.
CrossRef  |  Direct Link  |  

Fernandez, E.B., R. Monge and K. Hashizume, 2013. Two patterns for cloud computing: Secure virtual machine image repository and cloud policy management point. Proceedings of the 20th International Conference on Pattern Languages of Programs, October 23-26, 2013, ACM, Monticello, Illinois, ISBN:978-1-941652-00-8, pp: 1-15.

Fu, Y. and Z. Lin, 2013. EXTERIOR: Using a dual-VM based external shell for guest-os introspection, configuration and recovery. ACM. Sigplan Not., 48: 97-110.
Direct Link  |  

Ganghishetti, P., R. Wankar, R.M. Almuttairi and C.R. Rao, 2011. Rough set based quality of service design for service provisioning in clouds. Proceedings of the International Conference on Rough Sets and Knowledge Technology, October 9-12, 2011, Springer, Berlin, Heidelberg, Germany, ISBN:978-3-642-24424-7, pp: 268-273.

Garfinkel, T. and M. Rosenblum, 2005. When virtual is harder than real: Security challenges in virtual machine based computing environments. Proceedings of the 10th International Workshop on Hot Topics in Operating Systems, June 12-15, 2005, Santa Fe, New Mexico, USA., pp: 20-26.

Harnik, D., B. Pinkas and A. Shulman-Peleg, 2010. Side channels in cloud services: Deduplication in cloud storage. IEEE Secur. Privacy, 8: 40-47.
CrossRef  |  

Hashizume, K., N. Yoshioka and E.B. Fernandez, 2013. Three Misuse Patterns for Cloud Computing. In: Security Engineering for Cloud Computing: Approaches and Tools, Rosado, D.G., D. Mellado, E. Fernandez-Medina and M. Piattini (Eds.). IGI Global, Pennsylvania, USA., pp: 36-53.

He, X., T. Chomsiri, P. Nanda and Z. Tan, 2014. Improving cloud network security using the Tree-Rule firewall. Future Gener. Comput. Syst., 30: 116-126.
CrossRef  |  Direct Link  |  

Ibrahim, A.S., J. Hamlyn-Harris, J. Grundy and M. Almorsy, 2011. Cloudsec: A security monitoring appliance for virtual machines in the IaaS cloud model. Proceedings of the 2011 5th International Conference on Network and System Security, September 6-8, 2011, IEEE, Milan, Italy, ISBN:978-1-4577-0458-1, pp: 113-120.

Jansen, W.A., 2011. Cloud hooks: Security and privacy issues in cloud computing. Proceedings of the 2011 44th Hawaii International Conference on System Sciences, January 4-7, 2011, IEEE, Kauai, Hawaii, USA., ISBN:978-1-4244-9618-1, pp: 1-10.

Jasti, A., P. Shah, R. Nagaraj and R. Pendse, 2010. Security in multi-tenancy cloud. Proceedings of the 44th Annual 2010 IEEE International Carnahan Conference on Security Technology, October 5-8, 2010, IEEE, San Jose, California, USA., ISBN:978-1-4244-7403-5, pp: 35-41.

Karnwal, T., T. Sivakumar and G. Aghila, 2012. A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack. Proceedings of the 2012 IEEE Student’s International Conference on Electrical, Electronics and Computer Science, March 1-2, 2012, IEEE, Bhopal, India, ISBN:978-1-4673-1516-6, pp: 1-5.

Kazim, M., R. Masood and M.A. Shibli, 2013. Securing the virtual machine images in cloud computing. Proceedings of the 6th International Conference on Security of Information and Networks, November 26-28, 2013, ACM Aksaray, Turkey, ISBN:978-1-4503-2498-4, pp: 425-428.

Khan, M.A., 2016. A survey of security issues for cloud computing. J. Network Comput. Appl., 71: 11-29.
CrossRef  |  Direct Link  |  

Khorshed, M.T., A.B.M. Ali and S.A. Wasimi, 2012. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Generation Comput. Syst., 28: 833-851.
CrossRef  |  Direct Link  |  

Liu, F., L. Ren and H. Bai, 2014. Mitigating cross-VM side channel attack on multiple tenants cloud platform. J. Comput. Acad., 9: 1005-1013.
CrossRef  |  Direct Link  |  

Manna, M.E., 2018. A Cloud-based encryption for document storage using salesforce.com. J. Eng. Appl. Sci., 13: 2382-2387.
CrossRef  |  Direct Link  |  

Mell, P. and T. Grance, 2009. The NIST definition of cloud computing. National Inst. Standards Technol., 53: 20-50.

Morsy, M.A., J. Grundy and I. Muller, 2010. An analysis of the cloud computing security problem. Proceedings of the International Workshop on APSEC Cloud, November 30, 2010, Sydney, Australia, pp: 1-6.

OWASP., 2015. Vulner ability scanning tools-OWASP. OWASP, Maryland, USA.

Owens, D., 2010. Securing elasticity in the cloud. Commun. ACM., 53: 46-51.
CrossRef  |  Direct Link  |  

Pan, W., Y. Zhang, M. Yu and J. Jing, 2012. Improving virtualization security by splitting hypervisor into smaller components. Proceedings of the IFIP Annual International Conference on Data and Applications Security and Privacy, July 11-13, 2012, Springer, Berlin, Germany, ISBN:978-3-642-31539-8, pp: 298-313.

Pearce, M., S. Zeadally and R. Hunt, 2013. Virtualization: Issues, security threats and solutions. ACM Comput. Sur., Vol. 45. 10.1145/2431211.2431216

Perez-Botero, D., J. Szefer and R.B. Lee, 2013. Characterizing hypervisor vulnerabilities in cloud computing servers. Proceedings of the 2013 International Workshop on Security in Cloud Computing, May 8, 2013, ACM, Hangzhou, China, ISBN:978-1-4503-2067-2, pp: 3-10.

Ranjith, P., C. Priya and K. Shalini, 2012. On covert channels between virtual machines. J. Comput. Virol., 8: 85-97.
CrossRef  |  Direct Link  |  

Rittinghouse, J.W. and J.F. Ransome, 2009. Cloud Security Challenges. In: Cloud Computing: Implementation, Management and Security, Rittinghouse J.W. and J.F. Ransome (Eds.). CRC Press, Boca Raton, Florida, USA., ISBN:9781439806807, pp: 158-161.

Rong, H., M. Xian, H. Wang and J. Shi, 2013. Time-stealer: A stealthy threat for virtualization scheduler and its countermeasures. Proceedings of the International Conference on Information and Communications Security, November 20-22, 2013, Springer, Cham, ISBN:978-3-319-02725-8, pp: 100-112.

Santos, N., K.P. Gummadi and R. Rodrigues, 2009. Towards trusted cloud computing. Proceedings of the 2009 International Conference on Hot Topics in Cloud Computing, June 15, 2009, USENIX, Berkeley, California, USA., pp: 1-5.

Somani, U., K. Lakhani and M. Mundra, 2010. Implementing digital signature with RSA encryption algorithm to enhance the data security of cloud in cloud computing. Proceedings of the 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC 2010), October 28-30, 2010, IEEE, Solan, India, ISBN:978-1-4244-7675-6, pp: 211-216.

Sood, A.K. and R.J. Enbody, 2012. Targeted cyberattacks: A superset of advanced persistent threats. IEEE. Secur. Privacy, 11: 54-61.
CrossRef  |  Direct Link  |  

Srinivasamurthy, S., D.Q. Liu, A.V. Vasilakos and N. Xiong, 2013. Security and privacy in cloud computing: A survey. Parallel Cloud Comput., 2: 126-153.
Direct Link  |  

Stolfo, S.J., M.B. Salem and A.D. Keromytis, 2012. Fog computing: Mitigating insider data theft attacks in the cloud. Proceedings of the IEEE Symposium on Security and Privacy Workshops (SPW), May 24-25, 2012, IEEE, San Francisco, California, ISBN:978-1-4673-2157-0, pp: 125-128.

Su, T.A., 2013. A mechanism to prevent side channel attacks in cloud computing environments. Proceedings of the 2013 International World Congress on Computer Science, Computer Engineering and Applied Computing, October 23-25, 2013, San Francisco, California, USA., pp: 1-7.

Subashini, S. and V. Kavitha, 2011. A survey on security issues in service delivery models of cloud computing. J. Network Comput. Appl., 34: 1-11.
CrossRef  |  

Subramanian, N. and A. Jeyaraj, 2018. Recent security challenges in cloud computing. Comput. Electr. Eng., 71: 28-42.
CrossRef  |  Direct Link  |  

Symantec, 2015. Internet security threat report. Symantec, Mountain View, California, USA. https://www.symantec.com/content/en/us/enterprise/other_resources/21347933_GA_RPT-internet-security-threat-report-volume-20-2015.pdf

Szefer, J. and R.B. Lee, 2012. Architectural support for hypervisor-secure virtualization. ACM. SIGARCH. Comput. Archit. News, 40: 437-450.
CrossRef  |  Direct Link  |  

Szefer, J., E. Keller, R.B. Lee and J. Rexford, 2011. Eliminating the hypervisor attack surface for a more secure cloud. Proceedings of the 18th ACM International Conference on Computer and Communications Security, October 17-21, 2011, ACM Chicago, Illinois, USA., ISBN:978-1-4503-0948-6, pp: 401-412.

Takabi, H., J.B. Joshi and G.J. Ahn, 2010. Security and privacy challenges in cloud computing environments. IEEE Secur. Privacy, 8: 24-31.
CrossRef  |  Direct Link  |  

Tandon, S. and V. Agrawal, 2014. Cache-based side-channel attack on aes in cloud computing environment. Intl. J. Eng. Res. Technol., 3: 1080-1084.
Direct Link  |  

Tavakoli, Z., S. Meier and A. Vensmer, 2012. A framework for security context migration in a firewall secured virtual machine environment. Proceedings of the International Meeting on European Network of Universities and Companies in Information and Communication Engineering, August 29-31, 2012, Springer, Berlin, Germany, ISBN:978-3-642-32807-7, pp: 41-51.

Tebaa, M., S. El Hajji and A. El Ghazi, 2012. Homomorphic encryption method applied to Cloud Computing. Proceedings of the 2012 National Conference on Days of Network Security and Systems, April 20-21, 2012, IEEE, Marrakech, Morocco, ISBN:978-1-4673-1050-5, pp: 86-89.

Vaquero, L.M., L. Rodero-Merino and D. Moran, 2011. Locking the sky: A survey on IaaS cloud security. Computing, 91: 93-118.
CrossRef  |  

Wan, X., X. Zhang, L. Chen and J. Zhu, 2012. An improved vTPM migration protocol based trusted channel. Proceedings of the 2012 International Conference on Systems and Informatics (ICSAI2012), May 19-20, 2012, IEEE, Yantai, China, ISBN:978-1-4673-0198-5, pp: 870-875.

Wang, C., Q. Wang, K. Ren, N. Cao and W. Lou, 2012. Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput., 5: 220-232.
CrossRef  |  

Wang, J., A. Stavron and A. Ghosh, 2013. Autonomic Recovery: HyperCheck: A Hardware-Assisted Integrity Monitor. Master Thesis, Defense Technical Information, Fort Belvoir, Virginia, USA.

Wang, Z. and X. Jiang, 2010. Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. Proceedings of the 2010 IEEE International Symposium on Security and Privacy, May 16-19, 2010, IEEE. Berkeley, California, USA., ISBN:978-1-4244-6894-2, pp: 380-395.

Wei, J.P., X.L. Zhang, G. Ammons, V. Bala and P. Ning, 2009. Managing security of virtual machine images in a cloud environment. Proceedings of the 2009 ACM Workshop on Cloud Computing Security, November 13, 2009, Chicago, Illinois, USA, pp: 91-96.

Wei, J.P., X.L. Zhang, G. Ammons, V. Bala and P. Ning, 2009. Managing security of virtual machine images in a cloud environment. Proceedings of the 2009 ACM Workshop on Cloud Computing Security, November 13, 2009, Chicago, Illinois, USA, pp: 91-96.

Winkler, V.J., 2011. Securing the Cloud: Cloud Computer Security Techniques and Tactics. Syngress, Waltham, Massachusetts, ISBN:9781597495936, Pages: 314.

Wu, C., Z. Wang and X. Jiang, 2013. Taming hosted hypervisors with (mostly) deprivileged execution. Proceedings of the 20th Annual International Symposium on Network and Distributed System Security NDSS, February 24-27, 2013, The Internet Society, San Diego, California, USA., pp: 1-15.

Wu, H., Y. Ding, C. Winer and L. Yao, 2010. Network security for virtual machine in cloud computing. Proceedings of the 5th International Conference on Computer Sciences and Convergence Information Technology, November 30-December 2, 2010, IEEE, Seoul, South Korea, ISBN:978-1-4244-8567-3, pp: 18-21.

Wylie, J., M. Bakkaloglu, V. Pandurangan, M. Bigrigg and S. Oguz, et al., 2001. Selecting the right data distribution scheme for a survivable storage system. Master Thesis, Carnegie Mellon University, Pittsburgh, Pennsylvania.

Xia, Y., Y. Liu and H. Chen, 2013. Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks. Proceedings of the 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA), February 23-27, 2013, IEEE, Shenzhen, China, ISBN:978-1-4673-5585-8, pp: 246-257.

Xiaopeng, G., W. Sumei and C. Xianqin, 2010. VNSS: A network security sandbox for virtual computing environment. Proceedings of the 2010 IEEE Youth Conference on Information, Computing and Telecommunications, November 28-30, 2010, IEEE, Beijing, China, ISBN:978-1-4244-8883-4, pp: 395-398.

Xing, T., D. Huang, L. Xu, C.J. Chung and P. Khatkar, 2013. Snortflow: A openflow-based intrusion prevention system in cloud environment. Proceedings of the 2013 2nd International Workshop on GENI Research and Educational Experiment, March 20-22, 2013, IEEE, Salt Lake City, Utah, USA., pp: 89-92.

Yilek, S., 2010. Resettable public-key encryption: How to encrypt on a virtual machine. Proceedings of the International Conference on Cryptographers Track at the RSA, March 1-5, 2010, Springer, Berlin, Germany, ISBN:978-3-642-11924-8, pp: 41-56.

Zhang, F., Y. Huang, H. Wang, H. Chen and B. Zang, 2008. PALM: Security preserving VM live migration for systems with VMM-enforced protection. Proceedings of the 2008 3rd Asia-Pacific Conference on Trusted Infrastructure Technologies, October 14-17, 2008, IEEE, Hubei, China, ISBN:978-0-7695-3363-6, pp: 9-18.

Zhang, Y., A. Juels, M.K. Reiter and T. Ristenpart, 2012. Cross-VM side channels and their use to extract private keys. Proceedings of the 2012 ACM Conference on Computer and Communications Security, October 16-18, 2012, ACM, New York, USA., ISBN:978-1-4503-1651-4, pp: 305-316.

Zhou, F.F., M. Goel, P. Desnoyers and R. Sundaram, 2011. Scheduler vulnerabilities and coordinated attacks in cloud computing. Proceedings of the 10th IEEE International Symposium on Network Computing and Applications, August 25-27, 2011, Cambridge, MA., pp: 123-130.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved