ABSTRACT
Cloud Computing is a new evolutionary and dynamic platform that makes use of virtualization technology. In Cloud computing environment, virtualization abstracts the hardware system resources in software so that each application can be run in an isolated environment called the virtual machine and hypervisor does the allocation of virtual machines to different users that are hosted on same server. Although it provides many benefits like resource-sharing, cost-efficiency, high-performance computability and decrease in hardware cost but it also imposes a number of security threats. The threats can be directly on Virtual Machines (VMs) or indirectly on Hyper-visor through virtual machines that are hosted on it. This paper presents a review of all possible security threats and also their countermeasures by using Game-Theoretic approaches. Game Theory can be used as a defensive measure because of independent and strategic rational decision making nature of cloud users where each player would compete for best possible solution
- Charles A. Kamhoua, Luke Kwiat, Kevin A. Kwiat, Joon S. Park, Ming Zhao, Manuel Rodriguez, 2014. Game Theoretic Modeling of Security And Interdependency In A Public Cloud, IEEE International Conference On Cloud Computing. Google ScholarDigital Library
- Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu, 2013. A Game Theoretic Method to Model and Evaluate Attack-Defense Strategy in Cloud Computing, IEEE 10th International Conference on Services Computing, June 28 2013-July 3 2013, 659--666. Google ScholarDigital Library
- Iliana Iankoulova, Maya Daneva, 2012. Cloud Computing Security Requirements: a Systematic Review, (RCIS), 2012 Sixth International Conference on Research Challenges in Information Science, 16-18 May 2012, 1--7.Google ScholarCross Ref
- K. Lye and J. Wing, Game strategies in network security, 2005. International Journal of Information Security, Vol. 4, No. 1-2, 2005, 71--86. Google ScholarDigital Library
- K. Sallhammar, S. Knapskog, and B. Helvik, Using stochastic game theory to compute the expected behavior of attackers, In Proc. 2005 International Symposium on Applications and the Internet Workshops (Saint2005), 102--105. Google ScholarDigital Library
- Luke Kwiat, Charles A. Kamhoua, Kevin A. Kwiat, Jian Tang, Andrew Martin, 2015. Security-aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach, IEEE 8th International Conference on Cloud Computing, 13 Jan 2015, 556--563. Google ScholarDigital Library
- Maha Jebalia, Asma Ben Letaïfa, Mohamed Hamdi, Sami Tabbane, 2013. A Comparative Study on Game Theoretic Approaches for Resource Allocation in Cloud Computing Architectures, Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 17-20 June 2013, 336--341. Google ScholarDigital Library
- Mahdi Aiash, Glenford Mapp, Orhan Gemikonakli, 2014. Secure Live Virtual Machines Migration: Issues and Solutions, 28th International Conference on Advanced Information Networking and Applications Workshops, 13-16 May 2014, 160--165. Google ScholarDigital Library
- Michael Pearce, Sherali Zeadally, Ray Hunt, 2013. Virtualization: Issues, security threats, and solutions, ACM Computing Surveys, Vol. 45, No. 2, Article 17, February 2013. Google ScholarDigital Library
- Parvathy S. Pillai, Shrisha Rao, 2014. Resource Allocation in Cloud Computing using the Uncertainty Principle of Game Theory, Systems Journal, IEEE, 09 May 2014, ISSN:1932--8184, 1--12.Google Scholar
- Rajkuar Buyya, James Broberg, Andrej Goscinski, Cloud Computing: Principles and Paradigms, Wiley series on Parallel and Distributed Computing, 2014. Google ScholarDigital Library
- Seongwook Jin, Jeongseob Ahn, Jinho Seol, Sanghoon Cha, Jaehyuk Huh, Seungryoul Maeng, "H-SVM: Hardware-Assisted Secure Virtual Machines under A Vulnerable Hypervisor", IEEE Transactions On Computers, Vol. 64, No. 10, October 2015. Google ScholarDigital Library
- Xin Xu and Huiqun Yu, A Game Theory Approach to Fair and Efficient Resource Allocation in Cloud Computing, Hindawi Publishing Corporation Mathematical Problems in Engineering, Volume 2014, Article ID 915878.Google Scholar
- Xiannuan Liang and Yang Xiao, 2013. Game Theory for Network Security", IEEE Communications Surveys & Tutorials, Vol. 15, No. 1, First Quarter 2013.Google ScholarCross Ref
- Yi Han, Tansu Alpcan, Jeffrey Chan, Christopher Leckie, 2013. Security Games For Virtual Machine Allocation In Cloud Computing, 4th International Conference on Decision and Game Theory for Security-Vol. 8252, 99--118. Google ScholarDigital Library
- Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart, 2012. Cross-VM side channels and their use to extract private keys, Proceedings of the 2012 ACM conference on Computer and communications security, 305--316, DOI= http://doi.acm.org/10.1145/2382196.23822301 Google ScholarDigital Library
- Zhenping Lu, Xiangming Wen, A game theory based resource sharing scheme in cloud computing environment, 2012. Information and Communication Technologies (WICT), World Congress on Oct. 30-Nov. 2 2012, 1097--1102.Google Scholar
Recommendations
A Game Theoretic Approach for Virtual Machine Allocation Security in Cloud Computing
NISS '19: Proceedings of the 2nd International Conference on Networking, Information Systems & SecurityThe Virtualization technologies make cloud computing desirable but they also introduce serious security risks like co-resident attack and interdependence between users on the same hypervisor. The previous works on the subject of virtualization security ...
A Technical Review for Efficient Virtual Machine Migration
CUBE '13: Proceedings of the 2013 International Conference on Cloud & Ubiquitous Computing & Emerging TechnologiesThis paper presents the recent technical research survey on the efficient live migration of virtual machines. Virtual machine migration is required for many reasons like load balancing, energy reduction, dynamic resizing, and to increase availability. ...
Adaptive Virtual Machine Management in the Cloud: A Performance-Counter-Driven Approach
The success of cloud computing technologies heavily depends on both the underlying hardware and system software support for virtualization. In this study, we propose to elevate the capability of the hypervisor to monitor and manage co-running virtual ...
Comments