• DocumentCode
    31300
  • Title

    Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources

  • Author

    Chiang, Ron C. ; Rajasekaran, Sundaresan ; Nan Zhang ; Huang, H. Howie

  • Author_Institution
    Dept. of Electr. & Comput. Eng., George Washington Univ., Washington, DC, USA
  • Volume
    26
  • Issue
    6
  • fYear
    2015
  • fDate
    June 1 2015
  • Firstpage
    1732
  • Lastpage
    1742
  • Abstract
    The emerging paradigm of cloud computing, e.g., Amazon Elastic Compute Cloud (EC2), promises a highly flexible yet robust environment for large-scale applications. Ideally, while multiple virtual machines (VM) share the same physical resources (e.g., CPUs, caches, DRAM, and I/O devices), each application should be allocated to an independently managed VM and isolated from one another. Unfortunately, the absence of physical isolation inevitably opens doors to a number of security threats. In this paper, we demonstrate in EC2 a new type of security vulnerability caused by competition between virtual I/O workloads-i.e., by leveraging the competition for shared resources, an adversary could intentionally slow down the execution of a targeted application in a VM that shares the same hardware. In particular, we focus on I/O resources such as hard-drive throughput and/or network bandwidth-which are critical for data-intensive applications. We design and implement Swiper, a framework which uses a carefully designed workload to incur significant delays on the targeted application and VM with minimum cost (i.e., resource consumption). We conduct a comprehensive set of experiments in EC2, which clearly demonstrates that Swiper is capable of significantly slowing down various server applications while consuming a small amount of resources.
  • Keywords
    cloud computing; security of data; virtual machines; Amazon elastic compute cloud; EC2; Swiper; VM; cloud computing; hard-drive throughput; network bandwidth; security threats; security vulnerability; third-party clouds; virtual I/O workloads; virtual machine vulnerability; Cloud computing; Delays; IP networks; Security; Synchronization; Throughput; Virtualization; Cloud computing; scheduling; virtualization;
  • fLanguage
    English
  • Journal_Title
    Parallel and Distributed Systems, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1045-9219
  • Type

    jour

  • DOI
    10.1109/TPDS.2014.2325564
  • Filename
    6824231