A Survey on Security Challenges of Virtualization Technology in Cloud Computing
Virtualization has become a widely and attractive employed technology in cloud computing environments. Sharing of a single physical machine between multiple isolated virtual machines leading to a more optimized hardware usage, as well as make the migration and management of a virtual system more efficiently than its physical counterpart. Virtualization is a fundamental technology in a cloud environment. However, the presence of an additional abstraction layer among software and hardware causes new security issues. Security issues related to virtualization technology have become a significant concern for organizations due to arising some new security challenges.
This paper aims to identify the main challenges and risks of virtualization in cloud computing environments. Furthermore, it focuses on some common virtual-related threats and attacks affect the security of cloud computing.
The survey was conducted to obtain the views of the cloud stakeholders on virtualization vulnerabilities, threats, and approaches that can be used to overcome them.
Finally, we propose recommendations for improving security, and mitigating risks encounter virtualization that necessary to adopt secure cloud computing.
Keywords
- B. Loganayagi and S. Sujatha, “Creating virtual platform for cloud computing,” in Proc. 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2010, pp. 1-4.
- L. Garber, “The Challenges of Securing the Virtualized Environment,” Computer, vol. 45, no. 1, pp. 17-20, 2012.
- Cloud Security Alliance, “Top threats to cloud computing V1.0,” CSA, 2010. [Online]. Available: https://cloudsecurityalliance.org/ topthreats/csathreats.v1.0.pdf. [Accessed: Nov.-2017].
- Cloud Security Alliance,“The Notorious Nine. Cloud Computing Top Threats in 2013,” CSA, 2013. [Online]. Available: http://www.cloudsecurityalliance.org/topthreats.%5Cnhttp://www.cloudsecurityalliance.org. [Accessed: Oct.-2017].
- G.Xiaopeng, W.Sumei, and C.Xianqin,“VNSS: A network security sandbox for virtual computing environment,” In Proc. 2010 IEEE Youth Conference on Information, Computing and Telecommunications, 2010, pp. 395–398.
- N. Afshan,“Analysis and Assessment of the Vulnerabilities in Cloud Computing,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 2, 2017, pp. 2015–2018.
- S. Bulusu and K, Sudia, “A Study on Cloud Computing Security Challenges,” Master thesis, School of Computing at Blekinge Institute of Technology, 2012.
- H. Wu, Y. Ding, C. Winer, and L. Yao,“Network Security for Virtual Machine in Cloud Computing,” in Proc. 5th International Conference on Computer Sciences and Convergence Information Technology, 2009, pp. 18–21.
- M. R. Anala, J. Shetty, and G. Shobha,“A frameIEEwork for secure live migration of virtual machines,” in Proc. Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2013, 2013, pp. 243–248.
- A. Parashar and A. Borde, “Cloud Computing: Security Issues and its Detection Methods,” Int. J. of Engg. Sci. & Mgmt., vol. 5, no. 2, 2015, pp. 136–140.
- J. Wei, X. Zhang, G. Ammons, V. Bala, and P. Ning,“Managing security of virtual machine images in a cloud environment,” in Proc. ACM workshop on Cloud computing security - CCSW ’09, 2009, p. 91.
- Cloud Security Alliance, “Best Practices for Mitigating Risks in Virtualized Environments,” Downloads.cloudsecurityalliance.org, 2015. [Online]. Available: https://downloads.cloudsecurityalliance.org/whitepapers/Best_Practices_for%20_Mitigating_Risks_Virtual_Environments_April2015_4-1-15_GLM5.pdf. [Accessed: 11- Jan- 2017].
- T. Garfinkel and M. Rosenblum,“When Virtual is Harder Than Real: Security Challenges in Virtual Machine Based Computing Environments,” in Proc. 10th Conf. Hot Top. Oper. Syst., 2005, pp. 20–25.
- I. Studnia, E. Alata, Y. Deswarte, M. Kaâniche, and V. Nicomette, “Survey of Security Problems in Cloud Computing Virtual Machines,” in Proc. Computer and Electronics Security Applications Rendez-vous (C&ESAR), 2012, pp. 61–74.
- Y. Azar, S. Kamara, I. Menache, M. Raykova, and B. Shepherd, “Co-Location-Resistant Clouds,” in Proc. 6th edition of the ACM Workshop on Cloud Computing Security, 2014, pp. 9-20.
- V. Varadarajan, "Isolation in Public Clouds: Threats, Challenges and Defenses", PhD thesis, University of Wisconsin–Madison, 2015.
- I. Khalil, A. Khreishah, and M. Azeem,“Cloud Computing Security: A Survey,” Computers, vol. 3, no. 1, 2014, pp. 1–35.
- Y. Xia, Y. Liu, H. Chen, and B. Zang, “Defending against VM rollback attack,” in Proc. IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012), 2012, pp. 1-5.
- R.D. Londhe and S.S. Sherekar, “Imperial Analysis of Threats and Vulnerabilities in Cloud Computing,” International Journal of Advanced Research in Computer Science, vol. 5, no. 4 2014, pp. 12-17.
- T. Brooks, C. Caicedo, and J. Park, “Security challenges and countermeasures for trusted virtualized computing environments,” In Proc. World Congress on Internet Security (WorldCIS-2012), 2012, pp. 117 – 122.
- S. Luo, Z. Lin, X. Chen, Z. Yang, and J. Chen, “Virtualization security for cloud computing service,” in Proc. Int. Conf. Cloud Serv. Comput., 2011, pp. 174–179.
- R. Schwarzkopf, (2015) “Virtual Machine Lifecycle Management in Grid and Cloud computing,” University of Marburg. [Online]. Available: http://archiv.ub.uni-marburg.de/diss/z2015/0407/pdf/drs.pdf. [Accessed: Aug.-2017].
- V.K. Veeramachaneni, “Security Issues and Countermeasures in Cloud Computing Environment,” Int. J. Eng. Sci. Innov. Technol., vol. 4, no. 5, 2015, pp. 82–93.
- K. Owens, “Securing Virtual Compute Infrastructure in the Cloud,” SAVVIS, 2009.[Online]. Available: http://viewer.media.bitpipe.com/1018468865_999/1296679360_880/Securing-Virtual-Compute-Infrastructure-in-the-Cloud.pdf. [Accessed: Jun-2017].
- S. Z. I. Tariqul and D. Manivannan, “A Classification and Characterization of Security Threats in Cloud Computing,” Int. J. Next-Generation Comput., vol. 7, no. 1, pp. 1–17, 2016.
- C. N. Modi and K. Acha,“Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review,” J. Supercomput., vol. 73, no. 3, 2017, pp. 1192-1234.
Abstract Views: 315
PDF Views: 169