Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine

Cong Li, Qingni Shen, Kang Chen, Yahui Yang, Zhonghai Wu

2016

Abstract

With the widespread use of cloud computing, people pay more attention to the security of cloud platforms. For the case of some clouds, users are permitted to use the services, but they cannot communicate with each other in the same cloud. In this paper, we present a new kind of user-level covert channel which we called CCRCVM (Covert Channel using the Result of Creating a Virtual Machine). This covert channel exists in OpenStack, which we have confirmed. This covert channel takes advantage of the result of creating a virtual machine to make the users communicate. First of all, we describe the threat scenario of this covert channel. Then, we describe the theory and communication process of the covert channel. Afterwards, we implement the covert channel in our own OpenStack environment. We also measure the bandwidth and communication accuracy of this covert channel in many times. Finally, we discuss how to mitigate and eliminate this channel.

Download


Paper Citation


in Harvard Style

Li C., Shen Q., Chen K., Yang Y. and Wu Z. (2016). Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine . In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-167-0, pages 380-387. DOI: 10.5220/0005739403800387

in Bibtex Style

@conference{icissp16,
author={Cong Li and Qingni Shen and Kang Chen and Yahui Yang and Zhonghai Wu},
title={Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine},
booktitle={Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2016},
pages={380-387},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005739403800387},
isbn={978-989-758-167-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine
SN - 978-989-758-167-0
AU - Li C.
AU - Shen Q.
AU - Chen K.
AU - Yang Y.
AU - Wu Z.
PY - 2016
SP - 380
EP - 387
DO - 10.5220/0005739403800387