TY - GEN
T1 - CryptVMI
T2 - 7th IEEE International Conference on Cloud Computing, CLOUD 2014
AU - Yao, Fangzhou
AU - Campbell, Roy H.
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/12/3
Y1 - 2014/12/3
N2 - Virtualization techniques are the key in both public and private cloud computing environments. In such environments, multiple virtual instances are running on the same physical machine. The logical isolation between systems makes security assurance weaker than physically isolated systems. Thus, Virtual Machine Introspection techniques become essential to prevent the virtual system from being vulnerable to attacks. However, this technique breaks down the borders of the segregation between multiple tenants, which should be avoided in a public cloud computing environment. In this paper, we focus on building an encrypted Virtual Machine Introspection system, CryptVMI, to address the above concern, especially in a public cloud system. Our approach maintains a query handler on the management node to handle encrypted queries from user clients. We pass the query to the corresponding compute node that holds the virtual instance queried. The introspection application deployed on the compute node processes the query and acquires the encrypted results from the virtual instance for the user. This work shows our design and preliminary implementation of this system.
AB - Virtualization techniques are the key in both public and private cloud computing environments. In such environments, multiple virtual instances are running on the same physical machine. The logical isolation between systems makes security assurance weaker than physically isolated systems. Thus, Virtual Machine Introspection techniques become essential to prevent the virtual system from being vulnerable to attacks. However, this technique breaks down the borders of the segregation between multiple tenants, which should be avoided in a public cloud computing environment. In this paper, we focus on building an encrypted Virtual Machine Introspection system, CryptVMI, to address the above concern, especially in a public cloud system. Our approach maintains a query handler on the management node to handle encrypted queries from user clients. We pass the query to the corresponding compute node that holds the virtual instance queried. The introspection application deployed on the compute node processes the query and acquires the encrypted results from the virtual instance for the user. This work shows our design and preliminary implementation of this system.
UR - http://www.scopus.com/inward/record.url?scp=84919833642&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84919833642&partnerID=8YFLogxK
U2 - 10.1109/CLOUD.2014.149
DO - 10.1109/CLOUD.2014.149
M3 - Conference contribution
AN - SCOPUS:84919833642
T3 - IEEE International Conference on Cloud Computing, CLOUD
SP - 977
EP - 978
BT - Proceedings - 2014 IEEE 7th International Conference on Cloud Computing, CLOUD 2014
A2 - Kesselman, Carl
PB - IEEE Computer Society
Y2 - 27 June 2014 through 2 July 2014
ER -