User-Level Runtime Security Auditing for the Cloud

被引:16
|
作者
Majumdar, Suryadipta [1 ]
Madi, Taous [1 ]
Wang, Yushun [1 ]
Jarraya, Yosr [2 ]
Pourzandi, Makan [2 ]
Wang, Lingyu [1 ]
Debbabi, Mourad [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ H3G 1M8, Canada
[2] Ericsson Secur Res, Montreal, PQ H4S 0B6, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Cloud security; security auditing; compliance verification; runtime verification; user-level security; OpenStack; VERIFICATION;
D O I
10.1109/TIFS.2017.2779444
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is emerging as a promising IT solution for enabling ubiquitous, convenient, and on-demand accesses to a shared pool of configurable computing resources. However, the widespread adoption of cloud is still being hindered by the lack of transparency and accountability, which has traditionally been ensured through security auditing techniques. Auditing in cloud poses many unique challenges in data collection and processing (e.g., data format inconsistency and lack of correlation due to the heterogeneity of cloud infrastructures), and in verification (e.g., prohibitive performance overhead due to the sheer scale of cloud infrastructures and need of runtime verification for the dynamic nature of cloud). To this end, existing runtime auditing techniques do not offer a practical response time to verify a wide-range of user-level security properties for a large cloud. In this paper, we propose a runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC, SSO, and we implement and evaluate the framework based on OpenStack, a widely deployed cloud management system. The main idea towards reducing the response time to a practical level is to perform the costly operations only once, which is followed by significantly more efficient incremental runtime verification. Our experimental results show that runtime security auditing in a large cloud environment is realistic under our approach (e.g., our solution performs runtime auditing of 100,000 users within 500 milliseconds).
引用
收藏
页码:1185 / 1199
页数:15
相关论文
共 50 条
  • [31] Effective Prediction of Web User Behaviour with User-Level Models
    Dembczynski, Krzysztof
    Kotlowski, Wojciech
    Sydow, Marcin
    FUNDAMENTA INFORMATICAE, 2008, 89 (2-3) : 189 - 206
  • [32] User-level device drivers:: Achieved performance
    Leslie, B
    Chubb, P
    Fitzroy-Dale, N
    Götz, S
    Gray, C
    Macpherson, L
    Potts, D
    Shen, YT
    Elphinstone, K
    Heiser, G
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2005, 20 (05) : 654 - 664
  • [33] User-Level Differential Privacy With Few Examples Per User
    Ghazi, Badih
    Kamath, Pritish
    Kumar, Ravi
    Manurangsi, Pasin
    Meka, Raghu
    Zhang, Chiyuan
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 36 (NEURIPS 2023), 2023,
  • [34] A User-level Secure Grid File System
    Zhao, Ming
    Figueiredo, Renato J.
    2007 ACM/IEEE SC07 CONFERENCE, 2010, : 172 - 182
  • [35] Realizing the benefits of user-level channel diversity
    Vergetis, E
    Guérin, R
    Sarkar, S
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2005, 35 (05) : 15 - +
  • [36] A Sandbox Designed on User-level Virtualization Platform
    Xie Jin
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 183 - 187
  • [37] Understanding User-Level IP Blocks on the Internet
    Ren, Yimo
    Li, Hong
    Li, Ruinian
    Zhu, Hongsong
    Sun, Limin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [38] A migratable user-level process package for PVM
    Konuru, RB
    Otto, SW
    Walpole, J
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 1997, 40 (01) : 81 - 102
  • [39] User-level distributed file systems projects
    Univ of Western Australia, Crawley
    SIGCSE Bull, (333-337):
  • [40] Correlation prefetching with a user-level memory thread
    Solihin, Y
    Lee, J
    Torrellas, J
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2003, 14 (06) : 563 - 580