Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing

Cloud computing enables users to consume various IT resources in an on-demand manner, and with low management overhead. However, customers can face new security risks when they use cloud computing platforms. In this paper, we focus on one such threat-the co-resident attack, where malicious users bui...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on dependable and secure computing 2017-01, Vol.14 (1), p.95-108
Hauptverfasser: Yi Han, Chan, Jeffrey, Alpcan, Tansu, Leckie, Christopher
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 108
container_issue 1
container_start_page 95
container_title IEEE transactions on dependable and secure computing
container_volume 14
creator Yi Han
Chan, Jeffrey
Alpcan, Tansu
Leckie, Christopher
description Cloud computing enables users to consume various IT resources in an on-demand manner, and with low management overhead. However, customers can face new security risks when they use cloud computing platforms. In this paper, we focus on one such threat-the co-resident attack, where malicious users build side channels and extract private information from virtual machines co-located on the same server. Previous works mainly attempt to address the problem by eliminating side channels. However, most of these methods are not suitable for immediate deployment due to the required modifications to current cloud platforms. We choose to solve the problem from a different perspective, by studying how to improve the virtual machine allocation policy, so that it is difficult for attackers to co-locate with their targets. Specifically, we (1) define security metrics for assessing the attack; (2) model these metrics, and compare the difficulty of achieving co-residence under three commonly used policies; (3) design a new policy that not only mitigates the threat of attack, but also satisfies the requirements for workload balance and low power consumption; and (4) implement, test, and prove the effectiveness of the policy on the popular open-source platform OpenStack.
doi_str_mv 10.1109/TDSC.2015.2429132
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TDSC_2015_2429132</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7101258</ieee_id><sourcerecordid>4316974111</sourcerecordid><originalsourceid>FETCH-LOGICAL-c387t-5470b28614b6ae8f91780d694a9832d85d02cae0336006d3984add71e8ec1c083</originalsourceid><addsrcrecordid>eNp9kE1LxDAQhosoqKs_QLwEPHedyUeTHJf6CYqiu15LNslqtDZrkx7893ZZ8ehpBuZ534GnKE4Qpoigz-cXz_WUAoop5VQjozvFAWqOJQCq3XEXXJRCS9wvDlN6B6BcaX5QLBcpdK_kJfR5MC25N_YtdJ7M2jZak0PsyGNsgw0-kRzJhV_5zhHzakKXMqlj-eRTcL7LZJazsR-JhI7UbRzcePxcD3ksPyr2VqZN_vh3TorF1eW8vinvHq5v69ldaZmSuRRcwpKqCvmyMl6tNEoFrtLcaMWoU8IBtcYDYxVA5ZhW3Dgn0Stv0YJik-Js27vu49fgU27e49B348uGouS8EpTCfxQqiRVIKthI4ZayfUyp96tm3YdP0383CM1GeLMR3myEN7_Cx8zpNhO893-8REAqFPsBib16Vw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1871607253</pqid></control><display><type>article</type><title>Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing</title><source>IEEE Electronic Library (IEL)</source><creator>Yi Han ; Chan, Jeffrey ; Alpcan, Tansu ; Leckie, Christopher</creator><creatorcontrib>Yi Han ; Chan, Jeffrey ; Alpcan, Tansu ; Leckie, Christopher</creatorcontrib><description>Cloud computing enables users to consume various IT resources in an on-demand manner, and with low management overhead. However, customers can face new security risks when they use cloud computing platforms. In this paper, we focus on one such threat-the co-resident attack, where malicious users build side channels and extract private information from virtual machines co-located on the same server. Previous works mainly attempt to address the problem by eliminating side channels. However, most of these methods are not suitable for immediate deployment due to the required modifications to current cloud platforms. We choose to solve the problem from a different perspective, by studying how to improve the virtual machine allocation policy, so that it is difficult for attackers to co-locate with their targets. Specifically, we (1) define security metrics for assessing the attack; (2) model these metrics, and compare the difficulty of achieving co-residence under three commonly used policies; (3) design a new policy that not only mitigates the threat of attack, but also satisfies the requirements for workload balance and low power consumption; and (4) implement, test, and prove the effectiveness of the policy on the popular open-source platform OpenStack.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2015.2429132</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Channels ; Cloud computing ; Cloud computing security ; co-resident attack ; Cybersecurity ; Data integrity ; Effectiveness studies ; Information technology ; Measurement ; Network security ; Open source software ; Operating systems ; Policies ; Power consumption ; Power demand ; Resource management ; Security ; security metrics modelling ; Servers ; Virtual environments ; virtual machine allocation policy ; Virtual machining</subject><ispartof>IEEE transactions on dependable and secure computing, 2017-01, Vol.14 (1), p.95-108</ispartof><rights>Copyright IEEE Computer Society Jan-Feb 2017</rights><rights>Copyright IEEE Computer Society 2017</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c387t-5470b28614b6ae8f91780d694a9832d85d02cae0336006d3984add71e8ec1c083</citedby><cites>FETCH-LOGICAL-c387t-5470b28614b6ae8f91780d694a9832d85d02cae0336006d3984add71e8ec1c083</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7101258$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7101258$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yi Han</creatorcontrib><creatorcontrib>Chan, Jeffrey</creatorcontrib><creatorcontrib>Alpcan, Tansu</creatorcontrib><creatorcontrib>Leckie, Christopher</creatorcontrib><title>Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>Cloud computing enables users to consume various IT resources in an on-demand manner, and with low management overhead. However, customers can face new security risks when they use cloud computing platforms. In this paper, we focus on one such threat-the co-resident attack, where malicious users build side channels and extract private information from virtual machines co-located on the same server. Previous works mainly attempt to address the problem by eliminating side channels. However, most of these methods are not suitable for immediate deployment due to the required modifications to current cloud platforms. We choose to solve the problem from a different perspective, by studying how to improve the virtual machine allocation policy, so that it is difficult for attackers to co-locate with their targets. Specifically, we (1) define security metrics for assessing the attack; (2) model these metrics, and compare the difficulty of achieving co-residence under three commonly used policies; (3) design a new policy that not only mitigates the threat of attack, but also satisfies the requirements for workload balance and low power consumption; and (4) implement, test, and prove the effectiveness of the policy on the popular open-source platform OpenStack.</description><subject>Channels</subject><subject>Cloud computing</subject><subject>Cloud computing security</subject><subject>co-resident attack</subject><subject>Cybersecurity</subject><subject>Data integrity</subject><subject>Effectiveness studies</subject><subject>Information technology</subject><subject>Measurement</subject><subject>Network security</subject><subject>Open source software</subject><subject>Operating systems</subject><subject>Policies</subject><subject>Power consumption</subject><subject>Power demand</subject><subject>Resource management</subject><subject>Security</subject><subject>security metrics modelling</subject><subject>Servers</subject><subject>Virtual environments</subject><subject>virtual machine allocation policy</subject><subject>Virtual machining</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNp9kE1LxDAQhosoqKs_QLwEPHedyUeTHJf6CYqiu15LNslqtDZrkx7893ZZ8ehpBuZ534GnKE4Qpoigz-cXz_WUAoop5VQjozvFAWqOJQCq3XEXXJRCS9wvDlN6B6BcaX5QLBcpdK_kJfR5MC25N_YtdJ7M2jZak0PsyGNsgw0-kRzJhV_5zhHzakKXMqlj-eRTcL7LZJazsR-JhI7UbRzcePxcD3ksPyr2VqZN_vh3TorF1eW8vinvHq5v69ldaZmSuRRcwpKqCvmyMl6tNEoFrtLcaMWoU8IBtcYDYxVA5ZhW3Dgn0Stv0YJik-Js27vu49fgU27e49B348uGouS8EpTCfxQqiRVIKthI4ZayfUyp96tm3YdP0383CM1GeLMR3myEN7_Cx8zpNhO893-8REAqFPsBib16Vw</recordid><startdate>20170101</startdate><enddate>20170101</enddate><creator>Yi Han</creator><creator>Chan, Jeffrey</creator><creator>Alpcan, Tansu</creator><creator>Leckie, Christopher</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope></search><sort><creationdate>20170101</creationdate><title>Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing</title><author>Yi Han ; Chan, Jeffrey ; Alpcan, Tansu ; Leckie, Christopher</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c387t-5470b28614b6ae8f91780d694a9832d85d02cae0336006d3984add71e8ec1c083</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Channels</topic><topic>Cloud computing</topic><topic>Cloud computing security</topic><topic>co-resident attack</topic><topic>Cybersecurity</topic><topic>Data integrity</topic><topic>Effectiveness studies</topic><topic>Information technology</topic><topic>Measurement</topic><topic>Network security</topic><topic>Open source software</topic><topic>Operating systems</topic><topic>Policies</topic><topic>Power consumption</topic><topic>Power demand</topic><topic>Resource management</topic><topic>Security</topic><topic>security metrics modelling</topic><topic>Servers</topic><topic>Virtual environments</topic><topic>virtual machine allocation policy</topic><topic>Virtual machining</topic><toplevel>online_resources</toplevel><creatorcontrib>Yi Han</creatorcontrib><creatorcontrib>Chan, Jeffrey</creatorcontrib><creatorcontrib>Alpcan, Tansu</creatorcontrib><creatorcontrib>Leckie, Christopher</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yi Han</au><au>Chan, Jeffrey</au><au>Alpcan, Tansu</au><au>Leckie, Christopher</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2017-01-01</date><risdate>2017</risdate><volume>14</volume><issue>1</issue><spage>95</spage><epage>108</epage><pages>95-108</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>Cloud computing enables users to consume various IT resources in an on-demand manner, and with low management overhead. However, customers can face new security risks when they use cloud computing platforms. In this paper, we focus on one such threat-the co-resident attack, where malicious users build side channels and extract private information from virtual machines co-located on the same server. Previous works mainly attempt to address the problem by eliminating side channels. However, most of these methods are not suitable for immediate deployment due to the required modifications to current cloud platforms. We choose to solve the problem from a different perspective, by studying how to improve the virtual machine allocation policy, so that it is difficult for attackers to co-locate with their targets. Specifically, we (1) define security metrics for assessing the attack; (2) model these metrics, and compare the difficulty of achieving co-residence under three commonly used policies; (3) design a new policy that not only mitigates the threat of attack, but also satisfies the requirements for workload balance and low power consumption; and (4) implement, test, and prove the effectiveness of the policy on the popular open-source platform OpenStack.</abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2015.2429132</doi><tpages>14</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1545-5971
ispartof IEEE transactions on dependable and secure computing, 2017-01, Vol.14 (1), p.95-108
issn 1545-5971
1941-0018
language eng
recordid cdi_crossref_primary_10_1109_TDSC_2015_2429132
source IEEE Electronic Library (IEL)
subjects Channels
Cloud computing
Cloud computing security
co-resident attack
Cybersecurity
Data integrity
Effectiveness studies
Information technology
Measurement
Network security
Open source software
Operating systems
Policies
Power consumption
Power demand
Resource management
Security
security metrics modelling
Servers
Virtual environments
virtual machine allocation policy
Virtual machining
title Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-14T08%3A57%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Using%20Virtual%20Machine%20Allocation%20Policies%20to%20Defend%20against%20Co-Resident%20Attacks%20in%20Cloud%20Computing&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Yi%20Han&rft.date=2017-01-01&rft.volume=14&rft.issue=1&rft.spage=95&rft.epage=108&rft.pages=95-108&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2015.2429132&rft_dat=%3Cproquest_RIE%3E4316974111%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1871607253&rft_id=info:pmid/&rft_ieee_id=7101258&rfr_iscdi=true