A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling
Most companies and organizations rely nowadays on virtualized environments to host and run their applications. Some of these applications have stringent availability and security requirements. An important challenge for high availability in virtualized systems is software aging, which can lead the s...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8846668/ |
_version_ | 1818921059910418432 |
---|---|
author | Matheus Torquato Paulo Maciel Marco Vieira |
author_facet | Matheus Torquato Paulo Maciel Marco Vieira |
author_sort | Matheus Torquato |
collection | DOAJ |
description | Most companies and organizations rely nowadays on virtualized environments to host and run their applications. Some of these applications have stringent availability and security requirements. An important challenge for high availability in virtualized systems is software aging, which can lead the system to hangs or other types of failures. Software rejuvenation is applied to cope with software aging problems, whereas previous research suggests the use of Virtual Machine (VM) migration to reduce the downtime related to Virtual Machine Monitor (VMM) software rejuvenation. However, there is still a gap regarding the security implications of applying VM migration scheduling as support for VMM software rejuvenation. In this paper, we propose a security evaluation approach based on an availability model for virtualized systems with VM migration for VMM rejuvenation. The goal is to find the proper rejuvenation scheduling to reach the desired levels (or at least to avoid the undesired levels) of security risk and availability. We present three case studies comprising major security threats, namely Man-in-the-middle and Denial of Service attacks. Results provide insightful information regarding the tradeoff between availability and security risk when applying VM migration scheduling for rejuvenation purposes. |
first_indexed | 2024-12-20T01:31:38Z |
format | Article |
id | doaj.art-ab0604a35ea44392a861ff790584a6d2 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-20T01:31:38Z |
publishDate | 2019-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-ab0604a35ea44392a861ff790584a6d22022-12-21T19:58:06ZengIEEEIEEE Access2169-35362019-01-01713831513832610.1109/ACCESS.2019.29432738846668A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration SchedulingMatheus Torquato0https://orcid.org/0000-0003-3211-7951Paulo Maciel1Marco Vieira2Department of Informatics Engineering, CISUC, University of Coimbra, Coimbra, PortugalCenter of Informatics (CIn), Federal University of Pernambuco (UFPE), Recife, BrazilDepartment of Informatics Engineering, CISUC, University of Coimbra, Coimbra, PortugalMost companies and organizations rely nowadays on virtualized environments to host and run their applications. Some of these applications have stringent availability and security requirements. An important challenge for high availability in virtualized systems is software aging, which can lead the system to hangs or other types of failures. Software rejuvenation is applied to cope with software aging problems, whereas previous research suggests the use of Virtual Machine (VM) migration to reduce the downtime related to Virtual Machine Monitor (VMM) software rejuvenation. However, there is still a gap regarding the security implications of applying VM migration scheduling as support for VMM software rejuvenation. In this paper, we propose a security evaluation approach based on an availability model for virtualized systems with VM migration for VMM rejuvenation. The goal is to find the proper rejuvenation scheduling to reach the desired levels (or at least to avoid the undesired levels) of security risk and availability. We present three case studies comprising major security threats, namely Man-in-the-middle and Denial of Service attacks. Results provide insightful information regarding the tradeoff between availability and security risk when applying VM migration scheduling for rejuvenation purposes.https://ieeexplore.ieee.org/document/8846668/Availabilitycloud computingsecuritysoftware aging and rejuvenationVM migration |
spellingShingle | Matheus Torquato Paulo Maciel Marco Vieira A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling IEEE Access Availability cloud computing security software aging and rejuvenation VM migration |
title | A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling |
title_full | A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling |
title_fullStr | A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling |
title_full_unstemmed | A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling |
title_short | A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling |
title_sort | model for availability and security risk evaluation for systems with vmm rejuvenation enabled by vm migration scheduling |
topic | Availability cloud computing security software aging and rejuvenation VM migration |
url | https://ieeexplore.ieee.org/document/8846668/ |
work_keys_str_mv | AT matheustorquato amodelforavailabilityandsecurityriskevaluationforsystemswithvmmrejuvenationenabledbyvmmigrationscheduling AT paulomaciel amodelforavailabilityandsecurityriskevaluationforsystemswithvmmrejuvenationenabledbyvmmigrationscheduling AT marcovieira amodelforavailabilityandsecurityriskevaluationforsystemswithvmmrejuvenationenabledbyvmmigrationscheduling AT matheustorquato modelforavailabilityandsecurityriskevaluationforsystemswithvmmrejuvenationenabledbyvmmigrationscheduling AT paulomaciel modelforavailabilityandsecurityriskevaluationforsystemswithvmmrejuvenationenabledbyvmmigrationscheduling AT marcovieira modelforavailabilityandsecurityriskevaluationforsystemswithvmmrejuvenationenabledbyvmmigrationscheduling |