Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

Understanding Threats of Multitenancy and Comparative Performance Analysis of Virtualization Technologies

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Zinnia Sultana
10.5120/ijca2016910316

Zinnia Sultana. Understanding Threats of Multitenancy and Comparative Performance Analysis of Virtualization Technologies. International Journal of Computer Applications 144(6):13-17, June 2016. BibTeX

@article{10.5120/ijca2016910316,
	author = {Zinnia Sultana},
	title = {Understanding Threats of Multitenancy and Comparative Performance Analysis of Virtualization Technologies},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2016},
	volume = {144},
	number = {6},
	month = {Jun},
	year = {2016},
	issn = {0975-8887},
	pages = {13-17},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume144/number6/25182-2016910316},
	doi = {10.5120/ijca2016910316},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

With the rapid growth of cloud computing, computing resources are provisioned as metered on demand services over networks and can be easily allocated and released with minimal management effort which increases the security risks. This paper aims to provide an understanding of the different threats created by multi-tenancy and virtualization in a public IaaS cloud. This paper further analyze the performance of Xen hypervisor using Apache benchmark which is chosen as it gives a good idea how the hypervisor is able to handle increasing I/O stress in terms of CPU and memory storage as the number of virtual machines increases, ultimately giving an figurative approach on solving threats created by multi-tenancy and virtualization in a public IaaS cloud.

References

  1. D. Marshall, S.S. Beaver, J.W.Mc Carty, VMware ESX: Essentials in the virtual Data Center, CRC press, 2009.
  2. E.L.Haletky, VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers, Prentice Hall, 2008.
  3. A.T.Velte, T.J. Velte, R. Elsenpeter, Cloud Computing: A practical Approach, McGraw-Hill,2010
  4. G. Reese, Cloud Application Architectures: Building Applications and Infrastructures in the cloud, O’Reilly , 2009 Ahmad, J., Zaidi, S.M.H and Nawaz, S.,(2004) Dynamic Routing in wavelength Convertible WDM Networks, IEEE.
  5. C. Almond, P.C. Chiquito, C.H. Fachim, S. Kim, M. Okajima & P.Ramo, Multitenant Utility Computing on IBM Power Systems Running AIX, IBM Redbooks, 2009,http://www.redbooks.ibm.com/redbooks/pdfs/sg247681.pdf
  6. Cloud Security Alliance, Security guidance for Critical areas of Focus in Cloud Computing V2.1, December 2009,https://cloudsecurityalliance.org/wpcontent/uploads/2011/07/csaguide.v2.1.pdf
  7. European Network and Information Security Agency, Cloud Computing benefits, risks and recommendations for information security, November 2009, http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assesment.
  8. National Institute of Standards and Technology(NIST), http://www.nist.gov
  9. P.Mell and T.Grance, The NIST Definition of Cloud Computing, National Institute of Standards and Technology (NIST), July 2009, http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf
  10. Cloud Security alliance (CSA), http://cloudsecurityalliance.org/
  11. Cloud Security alliance, Security Guidance for Critical Areas of Focus in Cloud Computing v2.1, December 2009, https://cloudsecurityalliance.org/wpcontent/uploads/201/07/csaguide.v2.1.pdf
  12. Amazon Elastic Compute Cloud(EC2), http://aws.amazon.com/en/ec2
  13. T.Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey,you,fet off my cloud: exploring information leakage in the third-party compute clouds, In proceedings of the 16th ACM conference on Computer and communications security(CCS’09), 2009
  14. T. Ormandy. An empirical study into the security exposure to hosts os hostile virtualized environments. CanSec West Applied Security Conference,2007
  15. K.Kortchinsky, Cloudburst, Presented at Black Hat USA 2009, Las Vegas, http://www. Blackhat.com/presentations/bh-usa-09/KORTCHINSKY/BHUSA09-Kortchinsky-Amstutz, S.R., (1989). Burst Switching- An update. IEEE Communication, 50-57
  16. K. Kato, VMware Backdoor I/O Port, Accessed on August2011,http://sites.google.com/site/chitchatvmback/backdoor

Keywords

Cloud, Computing, threats, multi-tenancy, hypervisors, virtualization, benchmark.