Secure Cloud Maintenance Protecting workloads against insider attacks

被引:0
|
作者
Bleikertz, Soren [1 ]
Kurmus, Anil [1 ]
Nagy, Zoltan A. [1 ]
Schunter, Matthias [1 ]
机构
[1] IBM Res Zurich, Ruschlikon, Switzerland
关键词
virtualization; cloud; insider attacks; workload protection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Malicious insiders are a substantial risk for today's cloud computing infrastructures. A single malicious cloud administrator can eavesdrop or damage business-critical or personally identifiable information and computations of thousands of cloud customers. To protect cloud users against such insiders, we propose a novel approach that enables a security team to protect privacy and integrity of cloud users' workloads against attacks by system administrators during operation and maintenance. We achieve this by managing the privileges of administrators during operation and maintenance while re-establishing the security of a compute node once administration is completed. By default, administrators' access to cloud servers is disabled since cloud operation is automated. For manual maintenance operations, we propose five fine-grained privilege levels that balance the security objectives of cloud users with the operational requirements of cloud administrators. We demonstrate how existing cloud architectures need to be extended to incorporate our approach. We prototyped our management approach using the OpenStack cloud platform. Policy enforcement has been prototyped by leveraging SELinux type enforcement in the KVM compute nodes, in order to demonstrate the practical feasibility of our approach.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] A Secure DFT Architecture Protecting Crypto Chips Against Scan-Based Attacks
    Wang, Weizheng
    Wang, Jincheng
    Wang, Wei
    Liu, Peng
    Cai, Shuo
    [J]. IEEE ACCESS, 2019, 7 : 22206 - 22213
  • [22] Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
    Lixue SUN
    Chunxiang XU
    Mingwu ZHANG
    Kefei CHEN
    Hongwei LI
    [J]. Science China(Information Sciences), 2018, 61 (03) : 228 - 230
  • [23] Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
    Sun, Lixue
    Xu, Chunxiang
    Zhang, Mingwu
    Chen, Kefei
    Li, Hongwei
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [24] Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
    Lixue Sun
    Chunxiang Xu
    Mingwu Zhang
    Kefei Chen
    Hongwei Li
    [J]. Science China Information Sciences, 2018, 61
  • [25] A HYBRID PROTOCOL TO SECURE THE CLOUD FROM INSIDER THREATS
    Sriram, M.
    Patel, Vaibhav
    Harishma, D.
    Lakshmanan, Nachammai
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 65 - 69
  • [26] Database Intrusion Detection: Protecting Against the Insider Threat
    Barton, Kevin A.
    Jeffries-Horner, Carol J.
    [J]. AMCIS 2012 PROCEEDINGS, 2012,
  • [27] Efficient and Secure Techniques for Protecting Data in the Cloud
    Jeena, R.
    Kumar, S. Saravana
    Sudhan, S. Kavin Hari Hara
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [28] Protecting Obfuscation against Algebraic Attacks
    Barak, Boaz
    Garg, Sanjam
    Kalai, Yael Tauman
    Paneth, Omer
    Sahai, Amit
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 221 - 238
  • [29] Protecting users against phishing attacks
    Kirda, Engin
    Kruegel, Christopher
    [J]. COMPUTER JOURNAL, 2006, 49 (05): : 554 - 561
  • [30] A Recipe for Protecting Against Speculation Attacks
    Sherwood, Timothy
    [J]. COMMUNICATIONS OF THE ACM, 2021, 64 (12) : 104 - 104