A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling

Most companies and organizations rely nowadays on virtualized environments to host and run their applications. Some of these applications have stringent availability and security requirements. An important challenge for high availability in virtualized systems is software aging, which can lead the s...

Full description

Bibliographic Details
Main Authors: Matheus Torquato, Paulo Maciel, Marco Vieira
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8846668/
_version_ 1818921059910418432
author Matheus Torquato
Paulo Maciel
Marco Vieira
author_facet Matheus Torquato
Paulo Maciel
Marco Vieira
author_sort Matheus Torquato
collection DOAJ
description Most companies and organizations rely nowadays on virtualized environments to host and run their applications. Some of these applications have stringent availability and security requirements. An important challenge for high availability in virtualized systems is software aging, which can lead the system to hangs or other types of failures. Software rejuvenation is applied to cope with software aging problems, whereas previous research suggests the use of Virtual Machine (VM) migration to reduce the downtime related to Virtual Machine Monitor (VMM) software rejuvenation. However, there is still a gap regarding the security implications of applying VM migration scheduling as support for VMM software rejuvenation. In this paper, we propose a security evaluation approach based on an availability model for virtualized systems with VM migration for VMM rejuvenation. The goal is to find the proper rejuvenation scheduling to reach the desired levels (or at least to avoid the undesired levels) of security risk and availability. We present three case studies comprising major security threats, namely Man-in-the-middle and Denial of Service attacks. Results provide insightful information regarding the tradeoff between availability and security risk when applying VM migration scheduling for rejuvenation purposes.
first_indexed 2024-12-20T01:31:38Z
format Article
id doaj.art-ab0604a35ea44392a861ff790584a6d2
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-20T01:31:38Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-ab0604a35ea44392a861ff790584a6d22022-12-21T19:58:06ZengIEEEIEEE Access2169-35362019-01-01713831513832610.1109/ACCESS.2019.29432738846668A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration SchedulingMatheus Torquato0https://orcid.org/0000-0003-3211-7951Paulo Maciel1Marco Vieira2Department of Informatics Engineering, CISUC, University of Coimbra, Coimbra, PortugalCenter of Informatics (CIn), Federal University of Pernambuco (UFPE), Recife, BrazilDepartment of Informatics Engineering, CISUC, University of Coimbra, Coimbra, PortugalMost companies and organizations rely nowadays on virtualized environments to host and run their applications. Some of these applications have stringent availability and security requirements. An important challenge for high availability in virtualized systems is software aging, which can lead the system to hangs or other types of failures. Software rejuvenation is applied to cope with software aging problems, whereas previous research suggests the use of Virtual Machine (VM) migration to reduce the downtime related to Virtual Machine Monitor (VMM) software rejuvenation. However, there is still a gap regarding the security implications of applying VM migration scheduling as support for VMM software rejuvenation. In this paper, we propose a security evaluation approach based on an availability model for virtualized systems with VM migration for VMM rejuvenation. The goal is to find the proper rejuvenation scheduling to reach the desired levels (or at least to avoid the undesired levels) of security risk and availability. We present three case studies comprising major security threats, namely Man-in-the-middle and Denial of Service attacks. Results provide insightful information regarding the tradeoff between availability and security risk when applying VM migration scheduling for rejuvenation purposes.https://ieeexplore.ieee.org/document/8846668/Availabilitycloud computingsecuritysoftware aging and rejuvenationVM migration
spellingShingle Matheus Torquato
Paulo Maciel
Marco Vieira
A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling
IEEE Access
Availability
cloud computing
security
software aging and rejuvenation
VM migration
title A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling
title_full A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling
title_fullStr A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling
title_full_unstemmed A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling
title_short A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling
title_sort model for availability and security risk evaluation for systems with vmm rejuvenation enabled by vm migration scheduling
topic Availability
cloud computing
security
software aging and rejuvenation
VM migration
url https://ieeexplore.ieee.org/document/8846668/
work_keys_str_mv AT matheustorquato amodelforavailabilityandsecurityriskevaluationforsystemswithvmmrejuvenationenabledbyvmmigrationscheduling
AT paulomaciel amodelforavailabilityandsecurityriskevaluationforsystemswithvmmrejuvenationenabledbyvmmigrationscheduling
AT marcovieira amodelforavailabilityandsecurityriskevaluationforsystemswithvmmrejuvenationenabledbyvmmigrationscheduling
AT matheustorquato modelforavailabilityandsecurityriskevaluationforsystemswithvmmrejuvenationenabledbyvmmigrationscheduling
AT paulomaciel modelforavailabilityandsecurityriskevaluationforsystemswithvmmrejuvenationenabledbyvmmigrationscheduling
AT marcovieira modelforavailabilityandsecurityriskevaluationforsystemswithvmmrejuvenationenabledbyvmmigrationscheduling