User-Level Runtime Security Auditing for the Cloud

被引:16
|
作者
Majumdar, Suryadipta [1 ]
Madi, Taous [1 ]
Wang, Yushun [1 ]
Jarraya, Yosr [2 ]
Pourzandi, Makan [2 ]
Wang, Lingyu [1 ]
Debbabi, Mourad [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ H3G 1M8, Canada
[2] Ericsson Secur Res, Montreal, PQ H4S 0B6, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Cloud security; security auditing; compliance verification; runtime verification; user-level security; OpenStack; VERIFICATION;
D O I
10.1109/TIFS.2017.2779444
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is emerging as a promising IT solution for enabling ubiquitous, convenient, and on-demand accesses to a shared pool of configurable computing resources. However, the widespread adoption of cloud is still being hindered by the lack of transparency and accountability, which has traditionally been ensured through security auditing techniques. Auditing in cloud poses many unique challenges in data collection and processing (e.g., data format inconsistency and lack of correlation due to the heterogeneity of cloud infrastructures), and in verification (e.g., prohibitive performance overhead due to the sheer scale of cloud infrastructures and need of runtime verification for the dynamic nature of cloud). To this end, existing runtime auditing techniques do not offer a practical response time to verify a wide-range of user-level security properties for a large cloud. In this paper, we propose a runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC, SSO, and we implement and evaluate the framework based on OpenStack, a widely deployed cloud management system. The main idea towards reducing the response time to a practical level is to perform the costly operations only once, which is followed by significantly more efficient incremental runtime verification. Our experimental results show that runtime security auditing in a large cloud environment is realistic under our approach (e.g., our solution performs runtime auditing of 100,000 users within 500 milliseconds).
引用
收藏
页码:1185 / 1199
页数:15
相关论文
共 50 条
  • [21] User-level management of kernel memory
    Haeberlen, A
    Elphinstone, K
    ADVANCES IN COMPUTER SYSTEMS ARCHITECTURE, 2003, 2823 : 277 - 289
  • [22] User-level network interface protocols
    Bhoedjang, RAF
    Ruhl, T
    Bal, HE
    COMPUTER, 1998, 31 (11) : 53 - +
  • [23] User-level Data Center Tomography
    Twigg, Neil Alexander
    Fayed, Marwan
    Perkins, Colin
    Pezaros, Dimitrios
    Tso, Posco
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2012, 42 (04) : 101 - 102
  • [24] User-level performance in WLAN hotspots
    Lebeugle, F
    Proutiere, A
    PERFORMANCE CHALLENGES FOR EFFICIENT NEXT GENERATION NETWORKS, VOLS 6A-6C, 2005, 6A-6C : 1517 - 1526
  • [25] User-level operating system transactions
    Spinellis, Diomidis
    SOFTWARE-PRACTICE & EXPERIENCE, 2009, 39 (14): : 1215 - 1233
  • [26] Adding user-level SPACe: Security, privacy, and context to intelligent multimedia information architectures
    Jutla, Dawn N.
    Kanevsky, Dimitri
    2006 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY, WORKSHOPS PROCEEDINGS, 2006, : 77 - 84
  • [27] Efficient Association Rule Mining Algorithm Based on User Behavior for Cloud Security Auditing
    Zhao, Chunye
    Tu, Shanshan
    Chen, Haoyu
    Huang, Yongfeng
    2016 IEEE INTERNATIONAL CONFERENCE OF ONLINE ANALYSIS AND COMPUTING SCIENCE (ICOACS), 2016, : 145 - 149
  • [28] Towards mobility reports with user-level privacy
    Kapp, Alexandra
    Nunez von Voigt, Saskia
    Mihaljevic, Helena
    Tschorsch, Florian
    JOURNAL OF LOCATION BASED SERVICES, 2023, 17 (02) : 95 - 121
  • [29] A Fuzzy Approach to User-level Intrusion Detection
    Liu, Wei
    Mao, Yu
    Ci, Linlin
    Zhang, Fuquan
    INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2021, 23 (03) : 862 - 877
  • [30] LUTS: A Lightweight User-Level Transaction Scheduler
    Nicacio, Daniel
    Baldassin, Alexandro
    Araujo, Guido
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT I: ICA3PP 2011, 2011, 7916 : 144 - +