Secure Cloud Maintenance Protecting workloads against insider attacks

被引:0
|
作者
Bleikertz, Soren [1 ]
Kurmus, Anil [1 ]
Nagy, Zoltan A. [1 ]
Schunter, Matthias [1 ]
机构
[1] IBM Res Zurich, Ruschlikon, Switzerland
关键词
virtualization; cloud; insider attacks; workload protection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Malicious insiders are a substantial risk for today's cloud computing infrastructures. A single malicious cloud administrator can eavesdrop or damage business-critical or personally identifiable information and computations of thousands of cloud customers. To protect cloud users against such insiders, we propose a novel approach that enables a security team to protect privacy and integrity of cloud users' workloads against attacks by system administrators during operation and maintenance. We achieve this by managing the privileges of administrators during operation and maintenance while re-establishing the security of a compute node once administration is completed. By default, administrators' access to cloud servers is disabled since cloud operation is automated. For manual maintenance operations, we propose five fine-grained privilege levels that balance the security objectives of cloud users with the operational requirements of cloud administrators. We demonstrate how existing cloud architectures need to be extended to incorporate our approach. We prototyped our management approach using the OpenStack cloud platform. Policy enforcement has been prototyped by leveraging SELinux type enforcement in the KVM compute nodes, in order to demonstrate the practical feasibility of our approach.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Secure Quantum‐based Adder Design for Protecting Machine Learning Systems Against Side‐Channel Attacks
    Ain, Noor Ul
    Ahmadpour, Seyed-Sajad
    Navimipour, Nima Jafari
    Diakina, E.
    Kassa, Sankit R.
    [J]. Applied Soft Computing, 2025, 169
  • [42] Secure Control Against Replay Attacks
    Mo, Yilin
    Sinopoli, Bruno
    [J]. 2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 911 - 918
  • [43] A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data
    Dai, Hua
    Yang, Geng
    Zhu, Xiangyang
    Yi, Xun
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 111 - 116
  • [44] A secure and cost-efficient offloading policy for Mobile Cloud Computing against timing attacks
    Meng, Tianhui
    Wolter, Katinka
    Wu, Huaming
    Wang, Qiushi
    [J]. PERVASIVE AND MOBILE COMPUTING, 2018, 45 : 4 - 18
  • [45] Secure Estimation Against Malicious Attacks for Lithium-Ion Batteries Under Cloud Environments
    Wang, Licheng
    Tian, Engang
    Wang, Changsong
    Liu, Shuai
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2022, 69 (10) : 4237 - 4247
  • [46] Protecting Location Privacy against Inference Attacks
    Minami, Kazuhiro
    Borisov, Nikita
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 711 - 713
  • [47] Protecting JPEG Images Against Adversarial Attacks
    Prakash, Aaditya
    Moran, Nick
    Garber, Solomon
    DiLillo, Antonella
    Storer, James
    [J]. 2018 DATA COMPRESSION CONFERENCE (DCC 2018), 2018, : 137 - 146
  • [48] On Protecting SPHINCS+ Against Fault Attacks
    Genêt, Aymeric
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (02): : 80 - 114
  • [49] Protecting against cyber attacks in biometric technologies
    IEC
    [J]. China Standardization, 2023, (05) : 57 - 57
  • [50] SABRE: Protecting Bitcoin against Routing Attacks
    Apostolaki, Maria
    Marti, Gian
    Mueller, Jan
    Vanbever, Laurent
    [J]. 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,