CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization

نویسندگان

  • Flavio Lombardi
  • Roberto Di Pietro
چکیده

While on the onehandunresolved security issues pose abarrier to the widespread adoption of cloud computing technologies, on the other hand the computing capabilities of even commodity HW are boosting, in particular thanks to the adoption of *-core technologies. For instance, the Nvidia Compute Unified Device Architecture (CUDA) technology is increasingly available on a large part of commodity hardware. In this paper, we show that it is possible to effectively use such a technology to guarantee an increased level of security to cloud hosts, services, and finally to the user. Secure virtualization is the key enabling factor. It can protect such resources from attacks. In particular, secure virtualization can provide a framework enabling effectivemanagement of the security of possibly large, heterogeneous, CUDA-enabled computing infrastructures (e.g. clusters, server farms, and clouds). The contributions of this paper are twofold: first, to investigate the characteristics and security requirements of CUDAenabled cloud computing nodes; and, second, to provide an architecture for leveraging CUDA hardware resources in a secure virtualization environment, to improve cloud security without sacrificing CPU performance. A prototype implementation of our proposal and related results support the viability of our proposal.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Cloud Environment

Cloud Computing has rapidly emerged as a new computing paradigm that arrays massive numbers of computers in centralized and distributed data centers to deliver web-based applications, application platforms, and services via a utility model. Cloud computing technologies include grid computing, utility computing and virtualization. It is very much essential to make computations of the virtual mac...

متن کامل

Secure Encrypted Virtualization is Unsecure

Virtualization has become more important since cloud computing is getting more and more popular than before. There’s an increasing demand for security among the cloud customers. AMD plans to provide Secure Encrypted Virtualization (SEV)​[8] technology in its latest processor EPYC to protect virtual machines by encrypting its memory but without integrity protection. In this paper, we analyzed th...

متن کامل

QoS-Aware Secure Live Migration of Virtual Machines

The live migration of Virtual Machines (VMs) is a key technology in server virtualization solutions used to deploy Infrastructure-as-a-Service (IaaS) clouds. This process, on one hand, increases the elasticity, fault tolerance, and maintainability in the virtual environment. On the other hand, it increases the security challenges in cloud environments, especially when the migration is performed...

متن کامل

Deploying File Based Security on Dynamic Honeypot Enabled Infrastructure as a Service Data Centre

This paper is about deploying Distributed Honeypot System that captures and analyze the attacks on different operating system on Eucalyptus Iaas cloud. The file based security is proposed and implemented on data to make data access secure on virtual machines and physical system in cloud. This makes the private cloud deployment secure enough due to three layers of security provided by virtualiza...

متن کامل

Importance of Cloud Computing and its Security Issues in Network Virtualization Process

In this manuscript, the cloud computing and its security issues have been demonstrated in case of Network virtualization process. Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). Cloud co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010