User-Level Runtime Security Auditing for the Cloud

被引:16
|
作者
Majumdar, Suryadipta [1 ]
Madi, Taous [1 ]
Wang, Yushun [1 ]
Jarraya, Yosr [2 ]
Pourzandi, Makan [2 ]
Wang, Lingyu [1 ]
Debbabi, Mourad [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ H3G 1M8, Canada
[2] Ericsson Secur Res, Montreal, PQ H4S 0B6, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Cloud security; security auditing; compliance verification; runtime verification; user-level security; OpenStack; VERIFICATION;
D O I
10.1109/TIFS.2017.2779444
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is emerging as a promising IT solution for enabling ubiquitous, convenient, and on-demand accesses to a shared pool of configurable computing resources. However, the widespread adoption of cloud is still being hindered by the lack of transparency and accountability, which has traditionally been ensured through security auditing techniques. Auditing in cloud poses many unique challenges in data collection and processing (e.g., data format inconsistency and lack of correlation due to the heterogeneity of cloud infrastructures), and in verification (e.g., prohibitive performance overhead due to the sheer scale of cloud infrastructures and need of runtime verification for the dynamic nature of cloud). To this end, existing runtime auditing techniques do not offer a practical response time to verify a wide-range of user-level security properties for a large cloud. In this paper, we propose a runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC, SSO, and we implement and evaluate the framework based on OpenStack, a widely deployed cloud management system. The main idea towards reducing the response time to a practical level is to perform the costly operations only once, which is followed by significantly more efficient incremental runtime verification. Our experimental results show that runtime security auditing in a large cloud environment is realistic under our approach (e.g., our solution performs runtime auditing of 100,000 users within 500 milliseconds).
引用
收藏
页码:1185 / 1199
页数:15
相关论文
共 50 条
  • [41] User-Level Device Drivers: Achieved Performance
    Ben Leslie
    Peter Chubb
    Nicholas Fitzroy-Dale
    Stefan Götz
    Charles Gray
    Luke Macpherson
    Daniel Potts
    Yue-Ting Shen
    Kevin Elphinstone
    Gernot Heiser
    Journal of Computer Science and Technology, 2005, 20 : 654 - 664
  • [42] Defending Against User-Level Information Exfiltration
    Michener, John R.
    IT PROFESSIONAL, 2012, 14 (06) : 30 - 36
  • [43] Understanding User-Level IP Blocks on the Internet
    Ren, Yimo
    Li, Hong
    Li, Ruinian
    Zhu, Hongsong
    Sun, Limin
    Security and Communication Networks, 2022, 2022
  • [44] Gang scheduling with lightweight user-level communication
    Frachtenberg, E
    Petrini, F
    Coll, S
    Feng, WC
    INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2001, : 339 - 345
  • [45] Spidermine: Low Overhead User-Level Prefetching
    Won, Jiwoong
    Ahn, Jemin
    Yun, Sangwoon
    Kim, Jongchan
    Kang, Kyungtae
    38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023, 2023, : 1332 - 1341
  • [46] User-level resource-constrained sandboxing
    Chang, FZ
    Itzkovitz, A
    Karamcheti, V
    USENIX ASSOCIATION PROCEEDINGS OF THE 4TH UNSENIX WINDOWS SYSTEMS SYMPOSIUM, 2000, : 25 - 35
  • [47] Reducing waiting costs in user-level communication
    Damianakis, SN
    Chen, YQ
    Felten, EW
    11TH INTERNATIONAL PARALLEL PROCESSING SYMPOSIUM, PROCEEDINGS, 1997, : 381 - 387
  • [48] A user-level approach to network attached storage
    Sohan, R
    Hand, S
    LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 108 - 114
  • [49] User-Level Sentiment Evolution Analysis in Microblog
    Zhang Lumin
    Jia Yan
    Zhu Xiang
    Zhou Bin
    Han Yi
    CHINA COMMUNICATIONS, 2014, 11 (12) : 152 - 163
  • [50] User-level extensibility in the Mona file system
    Schermerhorn, PW
    Minerick, RJ
    Rijks, PW
    Freeh, VW
    USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK, 2001, : 173 - 183