2015 IEEE 8th International Conference on Cloud Computing 2015
DOI: 10.1109/cloud.2015.80
|View full text |Cite
|
Sign up to set email alerts
|

Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach

Abstract: With the growth of cloud computing, many businesses, both small and large, are opting to use cloud services compelled by a great cost savings potential. This is especially true of public cloud computing which allows for quick, dynamic scalability without many overhead or long-term commitments. However, one of the largest dissuasions from using cloud services comes from the inherent and unknown danger of a shared platform such as the hypervisor. An attacker can attack a virtual machine (VM) and then go on to co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 29 publications
(19 citation statements)
references
References 7 publications
0
19
0
Order By: Relevance
“…However, this equilibrium strategy should be avoided due to the possibility of exploitation of a user's investment for bug discovery and sharing by another user, which is also termed as free-riding on another firm's efforts. Therefore, the strategy profile (IS; IS) can be the only NE in this scenario, only when either condition (10) or (11) does not hold true. Proof 2 (c): This proposition can be proved in the similar manner as the proposition 1(a) proved earlier.…”
Section: Game Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…However, this equilibrium strategy should be avoided due to the possibility of exploitation of a user's investment for bug discovery and sharing by another user, which is also termed as free-riding on another firm's efforts. Therefore, the strategy profile (IS; IS) can be the only NE in this scenario, only when either condition (10) or (11) does not hold true. Proof 2 (c): This proposition can be proved in the similar manner as the proposition 1(a) proved earlier.…”
Section: Game Modelmentioning
confidence: 99%
“…Moreover, different public cloud users share a common platform such as the hypervisor. A common platform intensifies the well-known problem of cybersecurity interdependency [7], [8], [9], [10] as an attacker who gains access to the hypervisor can start, stop, and modify all of the VMs that are housed on that hypervisor. The result is a more challenging execution environment due to the risk aggregation from many users sharing the same platform.…”
Section: Introductionmentioning
confidence: 99%
“…Maintaining excessive computing resources cannot adequately guarantee the QoS conditions for cloud users as it can lead to tremendously high power consumption and low resource utilization [47]. Besides, allowing several applications, VMs, and users to commonly share a pool of cloud resources brings about many cybersecurity risks, such as the side-channel attacks [51,52], and the VM-to-VM IC risks [33,55].…”
Section: What Is Cloud Resource Management?mentioning
confidence: 99%
“…In the VM-to-VM IC attacks, an attacker can compromise the hypervisor after a successful attack on one of its vulnerable VMs [33,55]. He/she consequently can compromise all other coexisted secure VMs on that hypervisor.…”
Section: The Need For Cloud Resource Management To Minimize Cybersecumentioning
confidence: 99%
See 1 more Smart Citation