Cloud-Trust-a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds

被引:73
|
作者
Gonzales, Dan [1 ]
Kaplan, Jeremy M. [1 ]
Saltzman, Evan [1 ,2 ]
Winkelman, Zev [1 ]
Woods, Dulani [1 ]
机构
[1] RAND Corp, Arlington, VA 22202 USA
[2] Univ Penn, Wharton Sch, Philadelphia, PA 19104 USA
关键词
Cloud computing; cyber security; advanced persistent threats; security metrics; virtual machine (VM) isolation;
D O I
10.1109/TCC.2015.2415794
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The vulnerability of cloud computing systems (CCSs) to advanced persistent threats (APTs) is a significant concern to government and industry. We present a cloud architecture reference model that incorporates a wide range of security controls and best practices, and a cloud security assessment model-Cloud-Trust-that estimates high level security metrics to quantify the degree of confidentiality and integrity offered by a CCS or cloud service provider (CSP). Cloud-Trust is used to assess the security level of four multi-tenant IaaS cloud architectures equipped with alternative cloud security controls. Results show the probability of CCS penetration (high value data compromise) is high if a minimal set of security controls are implemented. CCS penetration probability drops substantially if a cloud defense in depth security architecture is adopted that protects virtual machine (VM) images at rest, strengthens CSP and cloud tenant system administrator access controls, and which employs other network security controls to minimize cloud network surveillance and discovery of live VMs.
引用
收藏
页码:523 / 536
页数:14
相关论文
共 50 条
  • [1] Data Governance Cloud Security Checklist at Infrastructure as a Service (IaaS)
    Abu Saed, Kamariah
    Aziz, Norshakirah
    Abdulkadir, Said Jadid
    Aziz, Izzatdin A.
    Hassan, Noor Hafizah
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (10) : 297 - 306
  • [2] Performance Benchmarking of Infrastructure-as-a-Service (IaaS) Clouds with Cloud WorkBench
    Scheuner, Joel
    Leitner, Philipp
    [J]. 2019 IEEE 4TH INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W 2019), 2019, : 257 - 258
  • [3] Performance Benchmarking of Infrastructure-as-a-Service (IaaS) Clouds with Cloud WorkBench
    Scheuner, Joel
    Leitner, Philipp
    [J]. COMPANION OF THE 2019 ACM/SPEC INTERNATIONAL CONFERENCE ON PERFORMANCE ENGINEERING (ICPE '19), 2019, : 53 - 56
  • [4] IaaS type Cloud infrastructure assessment and monitoring
    Kozlovszky, M.
    Toerocsik, M.
    Schubert, T.
    Poserne, V.
    [J]. 2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 249 - 252
  • [5] Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey
    Manvi, Sunilkurnar S.
    Shyam, Gopal Krishna
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 41 : 424 - 440
  • [6] Cloud Security based on IaaS Model Prospective
    Kumar, Saroj
    Singh, Priya
    Siddiqui, Shadab
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 2173 - 2178
  • [7] MODEL OF CLOUD COMPUTING REALISATION ON THE BASE OF INFRASTRUCTURE IAAS
    Peniak, Peter
    Franekova, Maria
    Zolotova, Iveta
    [J]. ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2016, 14 (02) : 122 - 128
  • [8] QoS Based Trust Management Model for Cloud IaaS
    Goyal, Mayank Kumar
    Gupta, Punit
    Aggarwal, Alok
    Kumar, Prakash
    [J]. 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 843 - 847
  • [9] Enhancement of Cloud Security and Strength of Service Using Trust Model
    Prakash, Pragati
    Ekka, Nidhi
    Kathane, Tanmay
    Yadav, Nishi
    [J]. INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 1345 - 1353
  • [10] Trust Model for Measuring Security Strength of Cloud Computing Service
    Shaikh, Rizwana
    Sasikumar, M.
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 380 - 389