User-Level Runtime Security Auditing for the Cloud

被引:16
|
作者
Majumdar, Suryadipta [1 ]
Madi, Taous [1 ]
Wang, Yushun [1 ]
Jarraya, Yosr [2 ]
Pourzandi, Makan [2 ]
Wang, Lingyu [1 ]
Debbabi, Mourad [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ H3G 1M8, Canada
[2] Ericsson Secur Res, Montreal, PQ H4S 0B6, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Cloud security; security auditing; compliance verification; runtime verification; user-level security; OpenStack; VERIFICATION;
D O I
10.1109/TIFS.2017.2779444
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is emerging as a promising IT solution for enabling ubiquitous, convenient, and on-demand accesses to a shared pool of configurable computing resources. However, the widespread adoption of cloud is still being hindered by the lack of transparency and accountability, which has traditionally been ensured through security auditing techniques. Auditing in cloud poses many unique challenges in data collection and processing (e.g., data format inconsistency and lack of correlation due to the heterogeneity of cloud infrastructures), and in verification (e.g., prohibitive performance overhead due to the sheer scale of cloud infrastructures and need of runtime verification for the dynamic nature of cloud). To this end, existing runtime auditing techniques do not offer a practical response time to verify a wide-range of user-level security properties for a large cloud. In this paper, we propose a runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC, SSO, and we implement and evaluate the framework based on OpenStack, a widely deployed cloud management system. The main idea towards reducing the response time to a practical level is to perform the costly operations only once, which is followed by significantly more efficient incremental runtime verification. Our experimental results show that runtime security auditing in a large cloud environment is realistic under our approach (e.g., our solution performs runtime auditing of 100,000 users within 500 milliseconds).
引用
下载
收藏
页码:1185 / 1199
页数:15
相关论文
共 50 条
  • [1] A user-level framework for auditing and monitoring
    Wu, YZ
    Yap, RHC
    21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 84 - 94
  • [2] DeaPS: Deep Learning-Based User-Level Proactive Security Auditing for Clouds
    Ou, Minjie
    Wang, Liming
    Xun, Hao
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [3] Security and Performance in the Delegated User-level Virtualization
    Chen, Jiahao
    Li, Dingji
    Mi, Zeyu
    Liu, Yuxuan
    Zang, Binyu
    Guan, Haibing
    Chen, Haibo
    PROCEEDINGS OF THE 17TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2023, 2023, : 227 - 245
  • [4] On Providing User-Level Data Privacy in Cloud
    Revalla, Madhuri
    Gupta, Ajay
    Bhuse, Vijay
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 106 - 114
  • [6] No-Label User-Level Membership Inference for ASR Model Auditing
    Miao, Yuantian
    Chen, Chao
    Pan, Lei
    Liu, Shigang
    Camtepe, Seyit
    Zhang, Jun
    Xiang, Yang
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 610 - 628
  • [7] Mutual Auditing Framework for Service Level Security Auditing in Cloud
    Sasmal, Soumitra
    Pan, Indrajit
    2017 THIRD IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), 2017, : 297 - 302
  • [8] Intranet User-Level Security Traffic Management with Deep Reinforcement Learning
    Jin, Qiuqing
    Wang, Liming
    2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
  • [9] Learning with User-Level Privacy
    Levy, Daniel
    Sun, Ziteng
    Amin, Kareem
    Kale, Satyen
    Kulesza, Alex
    Mohri, Mehryar
    Suresh, Ananda Theertha
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34
  • [10] Flexible user-level scheduling
    Craig, D
    Polychronopoulos, C
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2000, : 93 - 98