Inicio  /  Future Internet  /  Vol: 9 Núm: 2 Par: June (2017)  /  Artículo
ARTÍCULO
TITULO

An Access Control Model for Preventing Virtual Machine Escape Attack

Jiang Wu    
Zhou Lei    
Shengbo Chen and Wenfeng Shen    

Resumen

With the rapid development of Internet, the traditional computing environment is making a big migration to the cloud-computing environment. However, cloud computing introduces a set of new security problems. Aiming at the virtual machine (VM) escape attack, we study the traditional attack model and attack scenarios in the cloud-computing environment. In addition, we propose an access control model that can prevent virtual machine escape (PVME) by adapting the BLP (Bell-La Padula) model (an access control model developed by D. Bell and J. LaPadula). Finally, the PVME model has been implemented on full virtualization architecture. The experimental results show that the PVME module can effectively prevent virtual machine escape while only incurring 4% to 8% time overhead.

 Artículos similares

       
 
Yogeswaranathan Kalyani, Liam Vorster, Rebecca Whetton and Rem Collier    
In the last decade, digital twin (DT) technology has received considerable attention across various domains, such as manufacturing, smart healthcare, and smart cities. The digital twin represents a digital representation of a physical entity, object, sys... ver más
Revista: Future Internet

 
Muhammad Umer Masood, Muhammad Rashid, Saif Haider, Iram Naz, Chaitanya B. Pande, Salim Heddam, Fahad Alshehri, Ismail Elkhrachy, Amimul Ahsan and Saad Sh. Sammen    
Groundwater is an important source of freshwater. At the same time, anthropogenic activities, in particular, industrialization, urbanization, population growth, and excessive application of fertilizers, are some of the major reasons for groundwater quali... ver más
Revista: Water

 
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota    
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num... ver más
Revista: Future Internet

 
Elham Al Qahtani, Yousra Javed, Sarah Tabassum, Lipsarani Sahoo and Mohamed Shehab    
User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of such tools allows users to encrypt confidential emails, as well as manage their access control using features such as the expiration time, disabling forwardi... ver más
Revista: Future Internet

 
Salman Ali AlQahtani    
With the advent of 5G networks, the demand for improved mobile broadband, massive machine-type communication, and ultra-reliable, low-latency communication has surged, enabling a wide array of new applications. A key enabling technology in 5G networks is... ver más
Revista: Future Internet