Abstract
The paper discusses the security problems of cloud systems. It also contains a model of cloud systems that allows formally describe different security problems. The proposed model is based on graph theory and it describes main features of virtual machines in cloud systems. The paper formally presents a transformation of data operations that happens in hypervisor software due to virtualization technology. It allows formally define several cloud system security problems of hypervisor software. The paper also contains a discussion about other security problems with shared virtual machines in the cloud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Catteddu, D., Hogben, G.: Cloud Computing. In: Benefits, Risks and Recommendations for Information Security / European Network and Information Security Agency, ENISA (November 2009)
Michael, H.R.: VMware vSphere in the Enterprise (July 28, 2009), www.hypervisor.com
Zegzhda, P.D., Zegzhda, D.P.: Dynamic security methodology / MaBIT conference materials
Clark, C.: Live Migration of Virtual Machines. University of Cambridge Computer Laboratory Cambridge, UK, Department of Computer Science University of Copenhagen, Denmark
Jones, M.T.: Anatomy of a cloud storage infrastructure / IBM developer works (November 30, 2010)
How Does Xen Work? (December 2009), http://www.xen.org/files/Marketing/HowDoesXenWork.pdf
Elhage, N.: Virtunoid: A KVM Guest ! Host privilege escalation exploit / Black Hat USA (2011)
Weinman, J.: Axiomatic Cloud Theory. Working Paper (July 29, 2011)
Chan, W.K., Mei, L., Zhang, Z.: Modeling and Testing of Cloud Applications. City University of Hong Kong and The University of Hong Kong (2009)
Li, Y., Boucelma, O.: A CPN Provenance Model of Workflow: Towards Diagnosis in the Cloud. Laboratoire des Sciences de l’Information et des Systémes, Domaine Universitaire de Saint-Jérôme
Ma, H., Schewe, K.D., Thalheim, B., Wang, Q.: A Formal Model for the Interoperability of Service Clouds (December 22, 2011)
Henzinger, T.A., Singh, A.V., Singh, V., Wies, T., Zufferey, D.: FlexPRICE: Flexible Provisioning of Resources in a Cloud Environment / IST Austria
Zegzhda, P.D., Zegzhda, D.P., Karetnikov, A.V.: Cloud systems. In: Virtual Security or Secure Virtualization? / Proc. of the Conference ”RusCrypto” (2012)
Zegzhda, D.P., Karetnikov, A.V.: Cloud systems security. In: Problems and Prospect / (ISSN-2071-8217) Information Security Application #4 (2011)
Drouineaud, M., Luder, A., Sohr, K.: A Role based Access Control Model for Agent based Control Systems
Kalinin, M., Konoplev, A., Markov, Y.: Control of the security policies requirements in grid-systems. In: Proc. of the Conference Information Security of Russian Regions (ISRR 2011). St. Petersburg, Russia (2011)
Stepanova, T.: The relations between user behavior and outgoing network traffic for behaveiour anomaly detection. In: Proc. of the Conference Information Security of Russian Regions (ISRR 2011). St. Petersburg, Russia (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zegzhda, P.D., Zegzhda, D.P., Nikolskiy, A.V. (2012). Using Graph Theory for Cloud System Security Modeling. In: Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2012. Lecture Notes in Computer Science, vol 7531. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33704-8_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-33704-8_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33703-1
Online ISBN: 978-3-642-33704-8
eBook Packages: Computer ScienceComputer Science (R0)