CBAC4C : conflict-based VM isolation control for cloud computing
Loading...
Date
Authors
Dlamini, Moses Thandokuhle
Eloff, Jan H.P.
Venter, H.S. (Hein)
Eloff, Mariki M.
Journal Title
Journal ISSN
Volume Title
Publisher
Wiley
Abstract
For businesses to benefit from the many opportunities of cloud computing, they must first address a number of security challenges, such as the potential leakage of confidential data to unintended third parties. An inter-VM (where VM is virtual machine) attack, also known as cross-VM attack, is one threat through which cloud-hosted confidential data could be leaked to unintended third parties. An inter-VM attack exploits vulnerabilities between co-resident guest VMs that share the same cloud infrastructure. In an attempt to stop such an attack, this paper uses the principles of logical analysis to model a solution that provides physical separation of VMs belonging to conflicting tenants based on their levels of conflict. The derived mathematical model is founded on scientific principles and implemented using four conflict-aware VM placement algorithms. The resultant algorithms consider a tenant's risk appetite and cost implications. The model offers guidance to VM placement and is validated using a proof of concept. A cloud simulation tool was used to test and evaluate the effectiveness and efficiency of the model. The findings reflect that the introduction of the proposed model introduced a time lag in the time it took to place VM instances. On top of this, it was also discovered that the number and size of the VM instances has an effect on the VM placement performance. The findings further illustrate that the conflict tolerance level of a VM has a direct impact on the time it took to place.
Description
Keywords
Cloud computing, Conflict-aware virtual machine placement, Data leakage, Mathematical modeling
Sustainable Development Goals
Citation
Dlamini, M.T., Eloff, J.H.P., Venter, H.S. et al. 2022, 'CBAC4C: conflict-based VM isolation control for cloud computing', International Transactions in Operational Research, vol. 29, no. 1, pp. 372-395, doi : 10.1111/itor.12935.