skip to main content
10.1145/3600160.3604983acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

How to hide your VM from the big bad wolf? Co-location resistance vs. resource utilisation in VM placement strategies

Published:29 August 2023Publication History

ABSTRACT

VMs in cloud environments are at threat of attacks from VMs co-located on the same server, e. g. through side-channels. Reducing the ability of attackers to achieve co-location with specific VMs can alleviate the risk of targeted attacks. This paper presents the simulation framework VMPlaceSim, which allows to evaluate resource utilisation and resistance against co-location attacks of VM placement strategies. A new strategy based on the proportion of known users on servers is proposed and evaluated on real-world cloud workload data alongside existing strategies. The evaluation takes attacks into account in which malicious VMs are either launched in regular intervals or their launch is timed around the launch of target VMs. The results indicate that the new known-users strategy is significantly more resistant to co-location attacks than existing strategies aimed at optimising resource utilisation, while retaining a relatively high resource utilisation exceeding that of strategies aimed at thwarting co-location attacks.

References

  1. Amit Agarwal and Ta Nguyen Binh Duong. 2019. Secure virtual machine placement in cloud data centers. Future Gener. Comput. Syst. 100 (2019), 210–222.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Amazon AWS. 2021. Amazon EC2 Dedicated Instances. https://aws.amazon.com/ec2/pricing/dedicated-instances/ (visited 2023-03-16).Google ScholarGoogle Scholar
  3. Ahmed Osama Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick D. McDaniel, and Lisa M. Marvel. 2019. Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud. IEEE/ACM Trans. Netw. 27, 2 (2019), 560–576.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Yossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova, and F. Bruce Shepherd. 2014. Co-Location-Resistant Clouds. In ACM Cloud Computing Security Workshop, CCSW. ACM, 9–20.Google ScholarGoogle Scholar
  5. Antonio Barresi, Kaveh Razavi, Mathias Payer, and Thomas R. Gross. 2015. CAIN: Silently Breaking ASLR in the Cloud. In USENIX Workshop on Offensive Technologies, WOOT. USENIX Association.Google ScholarGoogle Scholar
  6. D. F. C. Brewer and Michael J. Nash. 1989. The Chinese Wall Security Policy. In IEEE Symposium on Security and Privacy,. IEEE Computer Society, 206–214.Google ScholarGoogle Scholar
  7. Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, César A. F. De Rose, and Rajkumar Buyya. 2011. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Softw. Pract. Exp. 41, 1 (2011), 23–50.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ron Chi-Lung Chiang, Sundaresan Rajasekaran, Nan Zhang, and H. Howie Huang. 2015. Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources. IEEE Trans. Parallel Distributed Syst. 26, 6 (2015), 1732–1742.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Eli Cortez. 2017. AzurePublicDatasetV1. https://github.com/Azure/AzurePublicDataset/blob/79bca52b02b87d64e332de5533d417981abb3f90/AzurePublicDatasetV1.md (visited 2023-03-16).Google ScholarGoogle Scholar
  10. Eli Cortez. 2019. AzurePublicDatasetV2. https://github.com/Azure/AzurePublicDataset/blob/79bca52b02b87d64e332de5533d417981abb3f90/AzurePublicDatasetV2.md (visited 2023-03-16).Google ScholarGoogle Scholar
  11. Eli Cortez, Anand Bonde, Alexandre Muzio, Mark Russinovich, Marcus Fontoura, and Ricardo Bianchini. 2017. Resource Central: Understanding and Predicting Workloads for Improved Resource Management in Large Cloud Platforms. In Symposium on Operating Systems Principles, SOSP. ACM, 153–167.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Daniel Espling, Lars Larsson, Wubin Li, Johan Tordsson, and Erik Elmroth. 2016. Modeling and Placement of Cloud Services with Internal Structure. IEEE Trans. Cloud Comput. 4, 4 (2016), 429–439.Google ScholarGoogle ScholarCross RefCross Ref
  13. Mauro Gaggero and Luca Caviglione. 2019. Model Predictive Control for Energy-Efficient, Quality-Aware, and Secure Virtual Machine Placement. IEEE Trans Autom. Sci. Eng. 16, 1 (2019), 420–432. https://doi.org/10.1109/TASE.2018.2826723Google ScholarGoogle ScholarCross RefCross Ref
  14. Berk Gülmezoglu, Thomas Eisenbarth, and Berk Sunar. 2017. Cache-Based Application Detection in the Cloud Using Machine Learning. In ACM ASIA Conference on Computer and Communications Security, ASIACCS. ACM, 288–300.Google ScholarGoogle Scholar
  15. Ori Hadary, Luke Marshall, Ishai Menache, Abhisek Pan, Esaias E. Greeff, David Dion, Star Dorminey, Shailesh Joshi, Yang Chen, Mark Russinovich, and Thomas Moscibroda. 2020. Protean: VM Allocation Service at Scale. In USENIX Symposium on Operating Systems Design and Implementation, OSDI. USENIX Association, 845–861.Google ScholarGoogle Scholar
  16. Yi Han, Tansu Alpcan, Jeffrey Chan, and Christopher Leckie. 2013. Security Games for Virtual Machine Allocation in Cloud Computing. In Conference Decision and Game Theory for Security, GameSec. Springer, 99–118.Google ScholarGoogle Scholar
  17. Yi Han, Jeffrey Chan, Tansu Alpcan, and Christopher Leckie. 2017. Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 14, 1 (2017), 95–108.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Brian Hay, Kara L. Nance, and Matt Bishop. 2011. Storm Clouds Rising: Security Challenges for IaaS Cloud Computing. In Hawaii International Conference on System Sciences, HICSS. IEEE Computer Society.Google ScholarGoogle Scholar
  19. Yoongu Kim, Ross Daly, Jeremie S. Kim, Chris Fallin, Ji-Hye Lee, Donghyuk Lee, Chris Wilkerson, Konrad Lai, and Onur Mutlu. 2014. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors. In ACM/IEEE International Symposium on Computer Architecture, ISCA. IEEE Computer Society, 361–372.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In IEEE Symposium on Security and Privacy. IEEE, 1–19.Google ScholarGoogle Scholar
  21. Younggyun Koh, Rob C. Knauerhase, Paul Brett, Mic Bowman, Zhihua Wen, and Calton Pu. 2007. An Analysis of Performance Interference Effects in Virtual Environments. In IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS. IEEE Computer Society, 200–209.Google ScholarGoogle Scholar
  22. Jens Lindemann and Mathias Fischer. 2018. A memory-deduplication side-channel attack to detect applications in co-resident virtual machines. In ACM Symposium on Applied Computing, SAC. ACM, 183–192.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Mohammad Masdari, Sayyid Shahab Nabavi, and Vafa Ahmadi. 2016. An overview of virtual machine placement schemes in cloud computing. J. Netw. Comput. Appl. 66 (2016), 106–127.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Soo-Jin Moon, Vyas Sekar, and Michael K. Reiter. 2015. Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration. In ACM Conference on Computer and Communications Security, CCS. ACM, 1595–1606.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Diego Perez-Botero, Jakub Szefer, and Ruby B. Lee. 2013. Characterizing hypervisor vulnerabilities in cloud computing servers. In International Workshop on Security in Cloud Computing, SCC. ACM, 3–10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. 2009. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In ACM Conference on Computer and Communications Security, CCS. ACM, 199–212.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, and Michael M. Swift. 2015. A Placement Vulnerability Study in Multi-Tenant Public Clouds. In USENIX Security Symposium. USENIX Association, 913–928.Google ScholarGoogle Scholar
  28. Ofir Weisse, Jo Van Bulck, Marina Minkin, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Raoul Strackx, Thomas F Wenisch, and Yuval Yarom. 2018. Foreshadow-NG: Breaking the virtual memory abstraction with transient out-of-order execution. Technical Report. KU Leuven. https://lirias.kuleuven.be/2089352?limo=0 (visited 2023-03-16).Google ScholarGoogle Scholar
  29. Yiming Xiao, Liang Liu, Zuchao Ma, Zijie Wang, and Weizhi Meng. 2021. Defending co-resident attack using reputation-based virtual machine deployment policy in cloud computing. Trans. Emerg. Telecommun. Technol. 32, 9 (2021).Google ScholarGoogle Scholar
  30. Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, and Radu Teodorescu. 2016. One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. In USENIX Security Symposium. USENIX Association, 19–35.Google ScholarGoogle Scholar
  31. Zhang Xu, Haining Wang, and Zhenyu Wu. 2015. A Measurement Study on Co-residence Threat inside the Cloud. In USENIX Security Symposium. USENIX Association, 929–944.Google ScholarGoogle Scholar
  32. Shungeng Zhang, Huasong Shan, Qingyang Wang, Jianshu Liu, Qiben Yan, and Jinpeng Wei. 2019. Tail Amplification in n-Tier Systems: A Study of Transient Cross-Resource Contention Attacks. In IEEE International Conference on Distributed Computing Systems, ICDCS. IEEE, 1527–1538.Google ScholarGoogle ScholarCross RefCross Ref
  33. Tianwei Zhang, Yinqian Zhang, and Ruby B. Lee. 2017. DoS Attacks on Your Memory in Cloud. In ACM ASIA Conference on Computer and Communications Security, AsiaCCS, Ramesh Karri, Ozgur Sinanoglu, Ahmad-Reza Sadeghi, and Xun Yi (Eds.). ACM, 253–265.Google ScholarGoogle Scholar
  34. Yinqian Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. 2012. Cross-VM side channels and their use to extract private keys. In ACM Conference on Computer and Communications Security, CCS. ACM, 305–316.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. How to hide your VM from the big bad wolf? Co-location resistance vs. resource utilisation in VM placement strategies

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
        August 2023
        1440 pages
        ISBN:9798400707728
        DOI:10.1145/3600160

        Copyright © 2023 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 29 August 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate228of451submissions,51%
      • Article Metrics

        • Downloads (Last 12 months)42
        • Downloads (Last 6 weeks)10

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format