2014 IEEE 7th International Conference on Cloud Computing 2014
DOI: 10.1109/cloud.2014.19
|View full text |Cite
|
Sign up to set email alerts
|

Improving Users' Isolation in IaaS: Virtual Machine Placement with Security Constraints

Abstract: International audienceNowadays virtualization is used as the sole mechanism to isolate different users on Cloud platforms. We will show that due to improper virtualization of micro-architectural components, data leak and modification can occur on public Clouds. Furthermore, using the same vector, it is possible to induce performance interferences, i.e. noisy neighbors. Using this approach, a VM can slow down and steal resources from concurrent VMs. We propose placement heuristics that take into account isolati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…As a consequence, all the hosted VMs become unavailable as well. An additional feature to take into account is the possible presence of applications requiring to run VMs in a secure environment (Caron and Cornabas 2014;Jhawar et al 2012). This may prevent the coexistence of VMs running on the same PM.…”
Section: Definition Of the Vm Placement Problemmentioning
confidence: 99%
“…As a consequence, all the hosted VMs become unavailable as well. An additional feature to take into account is the possible presence of applications requiring to run VMs in a secure environment (Caron and Cornabas 2014;Jhawar et al 2012). This may prevent the coexistence of VMs running on the same PM.…”
Section: Definition Of the Vm Placement Problemmentioning
confidence: 99%
“…Others existing preventive approaches are dedicated instances or collocation/anti-collocation placement. In this case, the isolation properties can be modelized as collocation and anticollocation constraints [3], [7]. Nevertheless, they require to express the list of tenants with whom each VM is allowed to share resources (or not).…”
Section: ) Tenantmentioning
confidence: 99%