Secure Cloud Maintenance Protecting workloads against insider attacks

被引:0
|
作者
Bleikertz, Soren [1 ]
Kurmus, Anil [1 ]
Nagy, Zoltan A. [1 ]
Schunter, Matthias [1 ]
机构
[1] IBM Res Zurich, Ruschlikon, Switzerland
关键词
virtualization; cloud; insider attacks; workload protection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Malicious insiders are a substantial risk for today's cloud computing infrastructures. A single malicious cloud administrator can eavesdrop or damage business-critical or personally identifiable information and computations of thousands of cloud customers. To protect cloud users against such insiders, we propose a novel approach that enables a security team to protect privacy and integrity of cloud users' workloads against attacks by system administrators during operation and maintenance. We achieve this by managing the privileges of administrators during operation and maintenance while re-establishing the security of a compute node once administration is completed. By default, administrators' access to cloud servers is disabled since cloud operation is automated. For manual maintenance operations, we propose five fine-grained privilege levels that balance the security objectives of cloud users with the operational requirements of cloud administrators. We demonstrate how existing cloud architectures need to be extended to incorporate our approach. We prototyped our management approach using the OpenStack cloud platform. Policy enforcement has been prototyped by leveraging SELinux type enforcement in the KVM compute nodes, in order to demonstrate the practical feasibility of our approach.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Ciphertext Retrieval against Insider Attacks for Cloud Storage
    Xie, Run
    Xui, Chunxiang
    Li, Fagen
    He, Changlian
    [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 202 - 206
  • [2] Provably secure untraceable electronic cash against insider attacks
    Hanatani, Yoshikazu
    Komano, Yuichi
    Ohta, Kazuo
    Kunihiro, Noboru
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (05) : 980 - 991
  • [3] Multi-signature schemes secure against active insider attacks
    Ohta, K
    Okamoto, T
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01) : 21 - 31
  • [4] A secure communication model for defending against insider packet dropping attacks
    Zhang, Zhong-Ke
    Wang, Yun
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (10): : 2003 - 2014
  • [5] Preventing Insider Attacks in the Cloud
    Sundararajan, Sudharsan
    Narayanan, Hari
    Pavithran, Vipin
    Vorungati, Kaladhar
    Achuthan, Krishnashree
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 488 - +
  • [6] POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs
    Sallam, Asmaa
    Bertino, Elisa
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1493 - 1495
  • [7] Protecting secret data from insider attacks
    Dagon, D
    Lee, WK
    Lipton, R
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 16 - 30
  • [8] An order-specified multisignature scheme secure against active insider attacks
    Tada, M
    [J]. INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 328 - 345
  • [9] Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks
    Lu, Yang
    Li, Jiguo
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [10] An overview of insider attacks in cloud computing
    Duncan, Adrian
    Creese, Sadie
    Goldsmith, Michael
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 2964 - 2981