2018
DOI: 10.1155/2018/1681908
|View full text |Cite
|
Sign up to set email alerts
|

Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

Abstract: The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hypervisor’ that may be attacked and user data can be compromised or hacked. In order to better define these threats to which a cloud hypervisor is exposed, we conducted an in-depth analysis and highlighted the security concerns of the cloud. We basically focused on the two particular issues, i.e., (a) data breaches and (b) weak authentication… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…Commercially developed hypervisors add to the attack surface of the system. Successfully attacking the hypervisor may allow an attacker to gain root privileges on all virtual machines contained within the physical server [7]. However, an ongoing area of research is focused on developing cyber secure hypervisors, ensuring that the attack surface is not increased [29].…”
Section: Control Theorymentioning
confidence: 99%
“…Commercially developed hypervisors add to the attack surface of the system. Successfully attacking the hypervisor may allow an attacker to gain root privileges on all virtual machines contained within the physical server [7]. However, an ongoing area of research is focused on developing cyber secure hypervisors, ensuring that the attack surface is not increased [29].…”
Section: Control Theorymentioning
confidence: 99%
“…John Patrick Barrowclough and Rameez Asif, in [13], identified the threats to which the cloud «hypervisor» is exposed, conducted an in-depth analysis and identified cloud security problems. For the in-depth analysis, a fully functional private cloud infrastructure running on CloudStack for software management was demonstrated and a real hack was organized.…”
Section: Brief Overview Of Used Articlesmentioning
confidence: 99%
“…Cloud infrastructures enable the building of elaborated services through the composition and configuration of multiple computing resources, such as virtual machines, network devices, and software components. These elementary resources may typically be deployed across different infrastructures supported by one or several cloud provider(s), and are subject to changes over time [1]. This dynamics increases the complexity of management tasks and may lead to potential vulnerabilities that may compromise the resources, or even the whole cloud composite service.…”
Section: Introductionmentioning
confidence: 99%
“…We would like to thank Professor Olivier Festor for his very helpful comments and advices on the submitted article. 1 Satisfiability Modulo Theories recent advances on virtualization techniques [2], allowing to transfer the resource(s) of a cloud composite service from a given provider (or a given infrastructure) to another provider (or infrastructure) [3]. This process is often motivated by performance and cost objectives with regard to the cloud properties, such as high scalability, rapid elasticity, resource pooling and on-demand self-service [4].…”
Section: Introductionmentioning
confidence: 99%