scholarly journals Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

2018 ◽  
Vol 2018 ◽  
pp. 1-20 ◽  
Author(s):  
John Patrick Barrowclough ◽  
Rameez Asif

The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hypervisor’ that may be attacked and user data can be compromised or hacked. In order to better define these threats to which a cloud hypervisor is exposed, we conducted an in-depth analysis and highlighted the security concerns of the cloud. We basically focused on the two particular issues, i.e., (a) data breaches and (b) weak authentication. For in-depth analysis, we have successfully demonstrated a fully functional private cloud infrastructure running on CloudStack for the software management and orchestrated a valid hack. We analyzed the popular open-source hypervisors, followed by an extensive study of the vulnerability reports associated with them. Based on our findings, we propose the characterization and countermeasures of hypervisor’s vulnerabilities. These investigations can be used to understand the potential attack paths on cloud computing and Cloud-of-Things (CoT) applications and identify the vulnerabilities that enabled them.

2012 ◽  
pp. 733-748
Author(s):  
Roland Kübert ◽  
Gregory Katsaros

Even though public cloud providers already exist and offer computing and storage services, cloud computing is still a buzzword for scientists in various fields such as engineering, finance, social sciences, etc. These technologies are currently mature enough to leave the experimental laboratory in order to be used in real-life scenarios. To this end, the authors consider that the prime example use case of cloud computing is a web hosting service. This paper presents the architectural approach as well as the technical solution for applying elastic web hosting onto a private cloud infrastructure using only free software. Through several available software applications and tools, anyone can build their own private cloud on top of a local infrastructure and benefit from the dynamicity and scalability provided by the cloud approach.


Author(s):  
Roland Kübert ◽  
Gregory Katsaros

Even though public cloud providers already exist and offer computing and storage services, cloud computing is still a buzzword for scientists in various fields such as engineering, finance, social sciences, etc. These technologies are currently mature enough to leave the experimental laboratory in order to be used in real-life scenarios. To this end, the authors consider that the prime example use case of cloud computing is a web hosting service. This paper presents the architectural approach as well as the technical solution for applying elastic web hosting onto a private cloud infrastructure using only free software. Through several available software applications and tools, anyone can build their own private cloud on top of a local infrastructure and benefit from the dynamicity and scalability provided by the cloud approach.


2019 ◽  
Vol 11 (3) ◽  
pp. 69 ◽  
Author(s):  
Aris Leivadeas ◽  
George Kesidis ◽  
Mohamed Ibnkahla ◽  
Ioannis Lambadaris

Network Function Virtualization (NFV) has revolutionized the way network services are offered to end users. Individual network functions are decoupled from expensive and dedicated middleboxes and are now provided as software-based virtualized entities called Virtualized Network Functions (VNFs). NFV is often complemented with the Cloud Computing paradigm to provide networking functions to enterprise customers and end-users remote from their premises. NFV along with Cloud Computing has also started to be seen in Internet of Things (IoT) platforms as a means to provide networking functions to the IoT traffic. The intermix of IoT, NFV, and Cloud technologies, however, is still in its infancy creating a rich and open future research area. To this end, in this paper, we propose a novel approach to facilitate the placement and deployment of service chained VNFs in a network cloud infrastructure that can be extended using the Mobile Edge Computing (MEC) infrastructure for accommodating mission critical and delay sensitive traffic. Our aim is to minimize the end-to-end communication delay while keeping the overall deployment cost to minimum. Results reveal that the proposed approach can significantly reduce the delay experienced, while satisfying the Service Providers’ goal of low deployment costs.


Cloud computing has a new edge computing paradigm these days. Sometimes cloud computing architectures don’t support for computer forensics investigations. Analyzing various types of logs and logging mechanism plays an important role in computer forensics. Distributed nature and the multi-tenant cloud models, where many users share the same processing and network resources, collecting, storing and analyzing logs from a cloud is very hard. User activity logs can be a valuable source of information in cloud forensic investigations. Generally, Cloud service providers have access to activity logs of cloud user and CSP can tamper the logs so that investigator cannot reach to the real culprit. In such an environment, log security is one of challenge in the cloud. Logging technique is used to monitor employee’s behavior, to keep track of malicious activities and prevent cloud networks from intrusion by well-known organizations. Ensuring the reliability and integrity of logs is crucial. Most existing solutions for secure logging are designed for traditional systems rather than the complexity of a cloud environment. In the proposed framework secure logging environment is provided by storing and processing activity logs and encrypting using advanced encryption method. It detects DDoS (distributed denial of service) attack on cloud infrastructure by using the published logs on cloud and thus helpful in cloud forensics. It is detected by the investigator using available application activity logs in the cloud server. Searchable encryption algorithm will be used to increase the security of the logging mechanism and to maintain confidentiality and privacy of user data. Proof of past (PPL) logs is created by storing logs at more than one place. This PPL helps in the verification process of changed logs by CSP the actual implementation of this application on AWS Infrastructure as a service ( IAAS ) cloud shows real-time use of this structure


Over the last few years the majority of small and large companies moving to cloud computing to develop IT solutions for businesses. It is technology which provides distributed and dynamically shared computing resources using certain operating techniques. In the revolution of information technology, cloud computing is becoming a key paradigm. Cloud computing further classified as Public, Private and Hybrid Cloud. It provides three services which are categorized as Infrastructure-as-Service, Platform-as-Service and Software-as-Service. Open source cloud management platforms providing Infrastructure-as-a-service are now commonly used because of the fastest growth of cloud. Many open source softwares are available for deploying public or private cloud. This paper provides a brief review and comparison of five well-known open source cloud software i.e. OpenNebula, Eucalyptus, OpenStack, Nimbus and CloudStack providing IaaS on the basis of their similar features and technology used. After reviewing the importance and features, we have found OpenStack Cloud Platform is more reliable and useful for the enterprises and organization because of its feature and rapid improvements in its features. The distinction in this paper is believed to help people to choose the suitable open source software according to their need.


2020 ◽  
Vol 1 (4) ◽  
pp. 144-149
Author(s):  
Novita Sari ◽  
Hidra Amnur ◽  
Rahmat Hidayat

Penyimpanan online seperti Cloud Computing merupakan platform yang paling banyak digunakan sebagai media penyimpanan online yang dapat diakses dimanapun dan kapanpun. Saat ini Cloud Computing mengalami perkembangan pesat. Salah satu diantaranya adalah menyediakan media penyimpanan yang dapat digunakan user untuk menyimpan data dengan aman. Salah satu Open Source yang menyediakan layanan media penyimpanan adalah Nextcloud. Nextcloud merupakan penyedia layanan penyimpanan gratis dan Open Source yang memiliki fitur keamanan dan kemampuan monitoring cloud. Informasi monitoring cloud disampaikan oleh Bot Telegram. User Telegram dapat berkomunukasi dengan bot telegram untuk mendapatkan informasi monitoring tentang Nextcloud. Terdapat beberapa perintah yang digunakan untuk mendapatkan informasi Monitoring


The cloud computing paradigm has settled to a stable stage. Due to its enormous advantages, services based on cloud computing are getting more and more attraction and adoption by diversified sectors of society. Because of its pay per use model, people prefer to execute various data crunching operations on high end virtual machines. Optimized resource management however becomes critical in such scenarios. Poor management of cloud resources may affect not only customer satisfaction but also wastage of available cloud infrastructure. An optimized resource sharing mechanism for collaborated cloud computing environments is suggested here. The suggested resource sharing technique solves starvation issue in inter cloud load balancing context. In case of occurrence of starvation problem, the suggested technique resolves the issue by switching under loaded and overloaded virtual machines between intra cloud and inter cloud computing environment.


2021 ◽  
Author(s):  
Fatma Louati ◽  
Oumayma Jouini ◽  
kaouthar sethom

Abstract The cloud computing paradigm has recently attracted many industries and academic attention. It provides network access on demand and offers applications, platforms, or access to a shared pool of hardware and software resources. For traditional deployment, the user reserves the most required resources. However, this system does not guarantee an optimal use of resources and is not profitable for users. The characteristic feature of the elasticity of the cloud Computing gives the Cloud the ability to perform an automatic up / down scale resources proportional to demand. However, classical deployment only considers the use of resources based on alarm, and does not consider the quality perceived by the end user. The aim of this paper is to set up a private IAAS Cloud infrastructure and complete it by supervision tools so we could optimize the management of the cloud elasticity based on users’ point of view or QoE. We have also used a Machine learning algorithm to predict the load charge of the physical machines of the cloud so that providers could manage efficiently their data centers.


2013 ◽  
Vol 3 (2) ◽  
pp. 47-60 ◽  
Author(s):  
Absalom E. Ezugwu ◽  
Seyed M. Buhari ◽  
Sahalu B. Junaidu

Virtual machine allocation problem is one of the challenges in cloud computing environments, especially for the private cloud design. In this environment, each virtual machine is mapped unto the physical host in accordance with the available resource on the host machine. Specifically, quantifying the performance of scheduling and allocation policy on a Cloud infrastructure for different application and service models under varying performance metrics and system requirement is an extremely challenging and difficult problem to resolve. In this paper, the authors present a Virtual Computing Laboratory framework model using the concept of private cloud by extending the open source IaaS solution Eucalyptus. A rule based mapping algorithm for Virtual Machines (VMs) which is formulated based on the principles of set theoretic is also presented. The algorithmic design is projected towards being able to automatically adapt the mapping between VMs and physical hosts’ resources. The paper, similarly presents a theoretical study and derivations of some performance evaluation metrics for the chosen mapping policies, these includes determining the context switching, waiting time, turnaround time, and response time for the proposed mapping algorithm.


Author(s):  
Srinivasa K. G. ◽  
Nishal Ancelette Pereira ◽  
Akshay K. Kallianpur ◽  
Subramanya E. Naligay

CloudStack is an Apache open source software that designed to install and handle large virtual machine (VM) networks, designed by Cloud.com and Citrix. This application is written in Java and was released under the terms of Apache License 2.0. This chapter discusses the easy availability and effortless scalability of CloudStack, which is an Infrastructure-as-a-service (IaaS) cloud computing platform software. We explore how CloudStack can either be used to setup public cloud services, or to provide a private cloud service.


Sign in / Sign up

Export Citation Format

Share Document