The tradeoff between the VMs threshold given to
the user and the elimination of this covert channel is
significant. If the platform makes a threshold too
small, the users cannot create enough virtual
machines to complete their tasks. However, if the
threshold is not small enough, the CCRCVM cannot
be eliminated. For example, the sender can choose a
kind of virtual machine which occupies a large
amount of resources. The sender just create a few
VMs (less than the threshold) and can make the host
full-load. The sender VMs threshold is not worked in
this condition.
If the cloud platform prohibits the capability that
a user can choose the location of a virtual machine
absolutely. The management of the cloud platform
will be not flexible. For example, a safety sensitive
client needs a complete isolation environment,
because of no privileged user, the request cannot be
satisfied. However, once a user is authorized to
choose the host. The threat of CCRCVM will appear,
because every user is not be guaranteed safety. In
reality, OpenStack permits the user to choose the
host.
7 CONCLUSIONS
In this paper, first, we propose a new covert channel
CCRCVM which can make two users to
communicate in IaaS cloud. Next we describe the
threat of CCRCVM and the theory of the sender and
receiver. We implement a prototype of CCRCVM in
OpenStack environment. We communicate
successfully between two OpenStack users by
CCRCVM. In our prototype. We do many
experiments. The results show that the accuracy is
100% when the bit cycle is 60s. In this situation, the
bandwidth is 0.0167bps.
In this paper, we present CCRCVM, an user-level
covert channel. We believe some other user-level
covert channels should exist, such as using the result
of VMs migration to construct the covert channel. In
future, we will continue to do the research of these
user-level covert channels.
ACKNOWLEDGEMENTS
This work is supported by the National High
Technology Research and Development Program
(“863” Program) of China under Grant No.
2015AA016009, the National Natural Science
Foundation of China under Grant No. 61232005, and
the Science and Technology Program of Shen Zhen,
China under Grant No. JSGG20140516162852628.
REFERENCES
Alarifi, S. S., & Wolthusen, S. D. (2012, December).
Detecting anomalies in IaaS environments through
virtual machine host system call analysis. In Internet
Technology And Secured Transactions, 2012
International Conference for (pp. 211-218). IEEE.
Bijon, K., Krishnan, R., & Sandhu, R. (2015, June).
Mitigating Multi-Tenancy Risks in IaaS Cloud Through
Constraints-Driven Virtual Resource Scheduling. In
Proceedings of the 20th ACM Symposium on Access
Control Models and Technologies (pp. 63-74). ACM.
Han, Y., Chan, J., Alpcan, T., & Leckie, C. (2014, June).
Virtual machine allocation policies against co-resident
attacks in cloud computing. In Communications (ICC),
2014 IEEE International Conference on (pp. 786-792).
IEEE.
Jaeger, T., Sailer, R., & Sreenivasan, Y. (2007, June).
Managing the risk of covert information flows in virtual
machine systems. In Proceedings of the 12th ACM
symposium on Access control models and technologies
(pp. 81-90). ACM.
Lampson, B. W. (1973). A note on the confinement
problem. Communications of the ACM, 16(10), 613-
615.
Li, Y., Shen, Q., Zhang, C., Sun, P., Chen, Y., & Qing, S.
(2012, March). A covert channel using core alternation.
In Advanced Information Networking and Applications
Workshops (WAINA), 2012 26th International
Conference on (pp. 324-328). IEEE.
Meade, F. G. G. (1993). A guide to understanding covert
channel analysis of trusted systems. NCSC4TG4030
National computer security center, Maryland
university.
Okamura, K., & Oyama, Y. (2010, March). Load-based
covert channels between Xen virtual machines. In
Proceedings of the 2010 ACM Symposium on Applied
Computing (pp. 173-180). ACM.
Percival, C. (2005). Cache missing for fun and profit.
Pitropakis, N., Lambrinoudakis, C., & Geneiatakis, D.
(2015). Till All Are One: Towards a Unified Cloud
IDS. In Trust, Privacy and Security in Digital Business
(pp. 136-149). Springer International Publishing.
Reuben, J. S. (2007). A survey on virtual machine security.
Helsinki University of Technology, 2, 36.
Ristenpart, T., Tromer, E., Shacham, H., & Savage, S.
(2009, November). Hey, you, get off of my cloud:
exploring information leakage in third-party compute
clouds. In Proceedings of the 16th ACM conference on
Computer and communications security (pp. 199-212).
ACM.
Shah, G., Molina, A., & Blaze, M. (2006, July). Keyboards
and Covert Channels. In USENIX Security.
Shen, Q., Wan, M., Zhang, Z., Zhang, Z., Qing, S., & Wu,
Z. (2013). A covert channel using event channel state