首页 > 最新文献

Cloud Computing Security Workshop最新文献

英文 中文
Return of the Covert Channel, Data Center Style 秘密通道的回归,数据中心风格
Pub Date : 2015-10-16 DOI: 10.1145/2808425.2808433
Kenneth Block, G. Noubir
This work characterizes an interference-based covert timing channel in a highly virtualized, active data center. The adversary leaks sensitive data from a compromised machine without any direct TCP/IP communication pathway between it and the channel's external sink. The attack exploits a publicly facing innocuous and uncompromised commercial server in a shared resources attack. This victimized server unwittingly partakes in a stealthy operation by providing the exfiltration medium. The channel exhibits a one bit per second data rate that can increase proportionally with the decrease in the victim's content transmission time. The channel operates 24x7 in a major university's Computer Science department's data center that experiences highly dynamic loads. Bit Error Rate and capacity are evaluated with the application of spreading gain, a technique used in wireless spread spectrum designs. Additionally, time synchronization drift characterization and channel tolerance to clock skew are demonstrated. A technique for identifying symbol discrimination thresholds requiring no a priori knowledge of truth is demonstrated.
这项工作在一个高度虚拟化、活跃的数据中心中描述了一个基于干扰的隐蔽时序通道。攻击者从被攻破的机器中泄露敏感数据,而机器与通道的外部接收器之间没有任何直接的TCP/IP通信路径。该攻击利用一个面向公众的无害且未受损害的商业服务器进行共享资源攻击。受害服务器通过提供泄漏介质,在不知不觉中参与了秘密操作。该信道显示出每秒1位的数据速率,该速率可以随着受害者内容传输时间的减少成比例地增加。该通道在一所主要大学的计算机科学系的数据中心中全天候运行,该数据中心经历了高度动态负载。误码率和容量是利用扩频增益(一种用于无线扩频设计的技术)来评估的。此外,还演示了时间同步漂移特性和信道对时钟偏差的容忍度。证明了一种无需先验知识就能识别符号辨别阈值的技术。
{"title":"Return of the Covert Channel, Data Center Style","authors":"Kenneth Block, G. Noubir","doi":"10.1145/2808425.2808433","DOIUrl":"https://doi.org/10.1145/2808425.2808433","url":null,"abstract":"This work characterizes an interference-based covert timing channel in a highly virtualized, active data center. The adversary leaks sensitive data from a compromised machine without any direct TCP/IP communication pathway between it and the channel's external sink. The attack exploits a publicly facing innocuous and uncompromised commercial server in a shared resources attack. This victimized server unwittingly partakes in a stealthy operation by providing the exfiltration medium. The channel exhibits a one bit per second data rate that can increase proportionally with the decrease in the victim's content transmission time. The channel operates 24x7 in a major university's Computer Science department's data center that experiences highly dynamic loads. Bit Error Rate and capacity are evaluated with the application of spreading gain, a technique used in wireless spread spectrum designs. Additionally, time synchronization drift characterization and channel tolerance to clock skew are demonstrated. A technique for identifying symbol discrimination thresholds requiring no a priori knowledge of truth is demonstrated.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122583341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fast Order-Preserving Encryption from Uniform Distribution Sampling 基于均匀分布采样的快速保序加密
Pub Date : 2015-10-16 DOI: 10.1145/2808425.2808431
Yong Ho Hwang, Sungwook Kim, J. Seo
Order-preserving encryption (OPE) is a symmetric encryption that ciphertexts preserve numerical ordering of the corresponding plaintexts. It allows various applications to search or sort the order of encrypted data (e.g., range queries in database) efficiently. In this paper, we study OPE for more practical use. We first discuss the elements of previous schemes considered as obstacles in practical applications and propose a new construction by eliminating them (especially probabilistic random variate generation functions such as hypergeometric and binomial distributions). We propose a new OPE whose encryption and decryption are much faster than those of the previous schemes by employing uniform distribution sampling. Furthermore, we provide a batch decryption algorithm to support concurrent decryption of numerical values within the specific range, which is firstly observed in the OPE research literature. It can be very efficiently applied for the encrypted range query processing of database systems. The security of our scheme is proven under the weak variants of notions proposed by Teranishi et al. in Asiacrypt 2014, which yield partial indistinguishability and one-wayness.
保序加密(OPE)是一种对称加密,它使密文保持相应明文的数字顺序。它允许各种应用程序有效地搜索或排序加密数据的顺序(例如,数据库中的范围查询)。在本文中,我们对OPE进行了更实际的研究。我们首先讨论了在实际应用中被认为是障碍的先前方案的元素,并提出了一种新的结构,通过消除它们(特别是概率随机变量生成函数,如超几何分布和二项分布)。我们采用均匀分布抽样的方法,提出了一种新的OPE,它的加解密速度比以前的方案快得多。此外,我们还提供了一种批量解密算法,支持对特定范围内的数值进行并发解密,这在OPE研究文献中首次观察到。它可以非常有效地应用于数据库系统的加密范围查询处理。在Teranishi et al.在Asiacrypt 2014中提出的概念的弱变体下证明了我们方案的安全性,这些概念产生部分不可区分性和单一性。
{"title":"Fast Order-Preserving Encryption from Uniform Distribution Sampling","authors":"Yong Ho Hwang, Sungwook Kim, J. Seo","doi":"10.1145/2808425.2808431","DOIUrl":"https://doi.org/10.1145/2808425.2808431","url":null,"abstract":"Order-preserving encryption (OPE) is a symmetric encryption that ciphertexts preserve numerical ordering of the corresponding plaintexts. It allows various applications to search or sort the order of encrypted data (e.g., range queries in database) efficiently. In this paper, we study OPE for more practical use. We first discuss the elements of previous schemes considered as obstacles in practical applications and propose a new construction by eliminating them (especially probabilistic random variate generation functions such as hypergeometric and binomial distributions). We propose a new OPE whose encryption and decryption are much faster than those of the previous schemes by employing uniform distribution sampling. Furthermore, we provide a batch decryption algorithm to support concurrent decryption of numerical values within the specific range, which is firstly observed in the OPE research literature. It can be very efficiently applied for the encrypted range query processing of database systems. The security of our scheme is proven under the weak variants of notions proposed by Teranishi et al. in Asiacrypt 2014, which yield partial indistinguishability and one-wayness.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124467372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cloud Security: The Industry Landscape and the Lure of Zero-Knowledge Protection 云安全:行业格局和零知识保护的诱惑
Pub Date : 2015-10-16 DOI: 10.1145/2808425.2808427
Chenxi Wang
Cloud computing is a change agent to how information technologies are consumed by businesses and consumers. The agility, scale, and resiliency brought by the cloud fundamentally changed the IT economy for many organizations. However, security assurance for cloud continues to be a barrier for adoption. This talk surveys the current cloud security technology landscape and more specifically the subject of "zero-knowledge protection" (ZKP). Borrowed from zero-knowledge proof, ZKP is a concept that allows cloud users to leverage cloud application functions without revealing critical data to the cloud infrastructure. ZKP has far-reaching impact on privacy, government surveillance, and data residency. There is also much misconception on what ZKP is and is not capable of doing. This talk looks at the specifics of ZKP technologies, the use cases for which ZKP provides the most value, and the ensuing societal impact. We will examine how ZKP can work across various layers of the cloud, from IaaS to SaaS, and briefly touch on how ZKP can function with some of the newer cloud technologies like Linux Containers and Docker.
云计算改变了企业和消费者使用信息技术的方式。云带来的敏捷性、规模和弹性从根本上改变了许多组织的IT经济。然而,云的安全保障仍然是采用云的一个障碍。本次演讲调查了当前的云安全技术领域,更具体地说,是“零知识保护”(ZKP)的主题。ZKP借用了零知识证明的概念,它允许云用户在不向云基础设施泄露关键数据的情况下利用云应用程序功能。ZKP对隐私、政府监控和数据驻留有着深远的影响。对于ZKP能做什么和不能做什么,也有很多误解。这次演讲着眼于ZKP技术的细节,ZKP提供最大价值的用例,以及随之而来的社会影响。我们将研究ZKP如何跨云的各个层(从IaaS到SaaS)工作,并简要介绍ZKP如何与一些较新的云技术(如Linux Containers和Docker)一起工作。
{"title":"Cloud Security: The Industry Landscape and the Lure of Zero-Knowledge Protection","authors":"Chenxi Wang","doi":"10.1145/2808425.2808427","DOIUrl":"https://doi.org/10.1145/2808425.2808427","url":null,"abstract":"Cloud computing is a change agent to how information technologies are consumed by businesses and consumers. The agility, scale, and resiliency brought by the cloud fundamentally changed the IT economy for many organizations. However, security assurance for cloud continues to be a barrier for adoption. This talk surveys the current cloud security technology landscape and more specifically the subject of \"zero-knowledge protection\" (ZKP). Borrowed from zero-knowledge proof, ZKP is a concept that allows cloud users to leverage cloud application functions without revealing critical data to the cloud infrastructure. ZKP has far-reaching impact on privacy, government surveillance, and data residency. There is also much misconception on what ZKP is and is not capable of doing. This talk looks at the specifics of ZKP technologies, the use cases for which ZKP provides the most value, and the ensuing societal impact. We will examine how ZKP can work across various layers of the cloud, from IaaS to SaaS, and briefly touch on how ZKP can function with some of the newer cloud technologies like Linux Containers and Docker.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"328 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124631712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Side Channels in Multi-Tenant Environments 多租户环境中的侧通道
Pub Date : 2015-10-16 DOI: 10.1145/2808425.2808426
M. Reiter
Due to the massive adoption of computing platforms that consolidate potentially distrustful tenants' applications on common hardware---both large (public clouds) and small (smartphones)---the security provided by these platforms to their tenants is increasingly being scrutinized. In this talk we review highlights from the last several years of research on a long-suspected but, until recently, largely hypothetical attack vector on such platforms, namely side-channel attacks. In these attacks, one tenant learns sensitive information about another tenant simply by running on the same hardware with it, but without violating the logical access control enforced by the platform's isolation software (virtual machine monitor or operating system). We will then summarize various strategies we have explored to defend against side-channel attacks in their various forms, both inexpensive defenses against specific attacks and more holistic but expensive protections.
由于大量采用计算平台,这些平台将可能不信任的租户的应用程序整合到通用硬件上——包括大型(公共云)和小型(智能手机)——这些平台为租户提供的安全性正日益受到审查。在这次演讲中,我们回顾了过去几年对这些平台上长期怀疑但直到最近主要是假设的攻击向量的研究亮点,即侧信道攻击。在这些攻击中,一个承租者通过与另一个承租者在相同的硬件上运行来获取有关该承租者的敏感信息,但不会违反平台隔离软件(虚拟机监视器或操作系统)强制执行的逻辑访问控制。然后,我们将总结我们所探索的各种策略,以防御各种形式的侧通道攻击,既有针对特定攻击的廉价防御,也有更全面但昂贵的保护。
{"title":"Side Channels in Multi-Tenant Environments","authors":"M. Reiter","doi":"10.1145/2808425.2808426","DOIUrl":"https://doi.org/10.1145/2808425.2808426","url":null,"abstract":"Due to the massive adoption of computing platforms that consolidate potentially distrustful tenants' applications on common hardware---both large (public clouds) and small (smartphones)---the security provided by these platforms to their tenants is increasingly being scrutinized. In this talk we review highlights from the last several years of research on a long-suspected but, until recently, largely hypothetical attack vector on such platforms, namely side-channel attacks. In these attacks, one tenant learns sensitive information about another tenant simply by running on the same hardware with it, but without violating the logical access control enforced by the platform's isolation software (virtual machine monitor or operating system). We will then summarize various strategies we have explored to defend against side-channel attacks in their various forms, both inexpensive defenses against specific attacks and more holistic but expensive protections.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115030706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ORAM Based Forward Privacy Preserving Dynamic Searchable Symmetric Encryption Schemes 基于ORAM的前向隐私保护动态可搜索对称加密方案
Pub Date : 2015-10-16 DOI: 10.1145/2808425.2808429
P. Rizomiliotis, S. Gritzalis
In the cloud era, as more and more businesses and individuals have their data hosted by an untrusted storage service provider, data privacy has become an important concern. In this context, searchable symmetric encryption (SSE) has gained a lot of attention. An SSE scheme aims to protect the privacy of the outsourced data by supporting, at the same time, outsourced search computation. However, the design of an efficient dynamic SSE (DSSE) has been shown to be a challenging task. In this paper, we present two efficient DSSEs that leak a limited amount of information. Both our schemes make a limited use of ORAM algorithms to achieve forward privacy and to minimize the overhead that ORAMs introduce, at the same time. To the best of our knowledge, there is only one other DSSE scheme that offers efficiently forward privacy. Our schemes are parallizable and significantly improve the search and update complexity, as well as the memory access locality.
在云时代,随着越来越多的企业和个人将数据托管在不可信的存储服务提供商上,数据隐私已经成为一个重要的问题。在这种情况下,可搜索对称加密(SSE)获得了很多关注。SSE方案旨在通过同时支持外包搜索计算来保护外包数据的隐私。然而,设计一个高效的动态SSE (DSSE)已被证明是一项具有挑战性的任务。在本文中,我们提出了两个有效的dss,泄漏有限数量的信息。我们的两种方案都有限地使用了ORAM算法来实现前向隐私,同时最小化ORAM引入的开销。据我们所知,只有一种DSSE方案能够有效地提供转发隐私。我们的方案是并行的,显著提高了搜索和更新的复杂性,以及内存访问的局部性。
{"title":"ORAM Based Forward Privacy Preserving Dynamic Searchable Symmetric Encryption Schemes","authors":"P. Rizomiliotis, S. Gritzalis","doi":"10.1145/2808425.2808429","DOIUrl":"https://doi.org/10.1145/2808425.2808429","url":null,"abstract":"In the cloud era, as more and more businesses and individuals have their data hosted by an untrusted storage service provider, data privacy has become an important concern. In this context, searchable symmetric encryption (SSE) has gained a lot of attention. An SSE scheme aims to protect the privacy of the outsourced data by supporting, at the same time, outsourced search computation. However, the design of an efficient dynamic SSE (DSSE) has been shown to be a challenging task. In this paper, we present two efficient DSSEs that leak a limited amount of information. Both our schemes make a limited use of ORAM algorithms to achieve forward privacy and to minimize the overhead that ORAMs introduce, at the same time. To the best of our knowledge, there is only one other DSSE scheme that offers efficiently forward privacy. Our schemes are parallizable and significantly improve the search and update complexity, as well as the memory access locality.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132431157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Performance Analysis of Linux RNG in Virtualized Environments 虚拟化环境下Linux RNG性能分析
Pub Date : 2015-10-16 DOI: 10.1145/2808425.2808434
R. Kumari, Mohsen Alimomeni, R. Safavi-Naini
We consider performance of Linux Random Number Generator(RNG) in virtualized environments and ask, (i) if the emulated hardware can provide sufficient entropy sources for the RNG and, (ii) if the RNG output of the host and the guest are isolated. These are important questions because insufficient entropy results in {em entropy starvation}, and the lack of isolation results in the host and the guest RNG output to be correlated. We give detailed comparison of the Linux RNGs that run on a host and a guest in different settings. Our results show that, as expected, hosts have higher entropy sources available and generate entropy at a higher rate (entropy bit per second). We also show that generating disk activity at high rate on the guest results in a significant flow of events from the guest to the host that could possibly be exploited by an adversary to find the output of the host RNG by controlling the guest.
我们考虑了Linux随机数生成器(RNG)在虚拟化环境中的性能,并提出了以下问题:(i)仿真硬件是否可以为RNG提供足够的熵源,(ii)主机和来宾的RNG输出是否隔离。这些都是重要的问题,因为熵不足会导致{em熵饥饿},而缺乏隔离会导致主机和来宾RNG输出相互关联。我们详细比较了在不同设置下运行在主机和客户机上的Linux rng。我们的结果表明,正如预期的那样,主机具有更高的可用熵源,并以更高的速率(每秒熵位)生成熵。我们还表明,在客户机上以高速率生成磁盘活动会导致从客户机到主机的大量事件流,攻击者可能会利用这些事件流通过控制客户机来找到主机RNG的输出。
{"title":"Performance Analysis of Linux RNG in Virtualized Environments","authors":"R. Kumari, Mohsen Alimomeni, R. Safavi-Naini","doi":"10.1145/2808425.2808434","DOIUrl":"https://doi.org/10.1145/2808425.2808434","url":null,"abstract":"We consider performance of Linux Random Number Generator(RNG) in virtualized environments and ask, (i) if the emulated hardware can provide sufficient entropy sources for the RNG and, (ii) if the RNG output of the host and the guest are isolated. These are important questions because insufficient entropy results in {em entropy starvation}, and the lack of isolation results in the host and the guest RNG output to be correlated. We give detailed comparison of the Linux RNGs that run on a host and a guest in different settings. Our results show that, as expected, hosts have higher entropy sources available and generate entropy at a higher rate (entropy bit per second). We also show that generating disk activity at high rate on the guest results in a significant flow of events from the guest to the host that could possibly be exploited by an adversary to find the output of the host RNG by controlling the guest.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126607953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
How Private is Your Private Cloud?: Security Analysis of Cloud Control Interfaces 你的私有云有多私有?:云控制接口安全分析
Pub Date : 2015-10-16 DOI: 10.1145/2808425.2808432
Dennis Felsch, M. Heiderich, Frederic Schulz, Jorg Schwenk
The security gateway between an attacker and a user's private data is the Cloud Control Interface (CCI): If an attacker manages to get access to this interface, he controls the data. Several high-level data breaches originate here, the latest being the business failure of the British company Code Spaces. In such situations, using a private cloud is often claimed to be more secure than using a public cloud. In this paper, we show that this security assumption may not be justified: We attack private clouds through their rich, HTML5-based control interfaces, using well-known attacks on web interfaces (XSS, CSRF, and Clickjacking) combined with novel exploitation techniques for Infrastructure as a Service clouds. We analyzed four open-source projects for private IaaS cloud deployment (Eucalyptus, OpenNebula, OpenStack, and openQRM) in default configuration. We were able to compromise the security of three cloud installations (Eucalyptus, OpenNebula, and openQRM) One of our attacks (OpenNebula) allowed us to gain root access to VMs even if full perimeter security is enabled, i.e. if the cloud control interface is only reachable from a certain segment of the company's network, and if all network traffic is filtered through a firewall. We informed all projects about the attack vectors and proposed mitigations. As a general recommendation, we propose to make web management interfaces for private clouds inaccessible from the Internet, and to include this technical requirement in the definition of a private cloud.
攻击者和用户私有数据之间的安全网关是云控制接口(CCI):如果攻击者设法访问该接口,他就控制了数据。几起高级别的数据泄露都源于此,最近的一次是英国公司Code Spaces的业务失败。在这种情况下,使用私有云通常被认为比使用公共云更安全。在本文中,我们证明了这种安全假设可能是不合理的:我们通过私有云丰富的、基于html5的控制接口攻击私有云,使用众所周知的web接口攻击(XSS、CSRF和Clickjacking),结合基础设施即服务云的新开发技术。我们分析了默认配置下用于私有IaaS云部署的四个开源项目(Eucalyptus、OpenNebula、OpenStack和openQRM)。我们能够破坏三个云安装(Eucalyptus, OpenNebula和openQRM)的安全性。我们的一个攻击(OpenNebula)允许我们获得对虚拟机的根访问权限,即使启用了完整的外围安全,也就是说,如果云控制接口只能从公司网络的某个部分访问,并且如果所有网络流量都通过防火墙过滤。我们向所有项目通报了攻击媒介和建议的缓解措施。作为一般建议,我们建议将私有云的web管理接口从Internet上不可访问,并将此技术要求包含在私有云的定义中。
{"title":"How Private is Your Private Cloud?: Security Analysis of Cloud Control Interfaces","authors":"Dennis Felsch, M. Heiderich, Frederic Schulz, Jorg Schwenk","doi":"10.1145/2808425.2808432","DOIUrl":"https://doi.org/10.1145/2808425.2808432","url":null,"abstract":"The security gateway between an attacker and a user's private data is the Cloud Control Interface (CCI): If an attacker manages to get access to this interface, he controls the data. Several high-level data breaches originate here, the latest being the business failure of the British company Code Spaces. In such situations, using a private cloud is often claimed to be more secure than using a public cloud. In this paper, we show that this security assumption may not be justified: We attack private clouds through their rich, HTML5-based control interfaces, using well-known attacks on web interfaces (XSS, CSRF, and Clickjacking) combined with novel exploitation techniques for Infrastructure as a Service clouds.\u0000 We analyzed four open-source projects for private IaaS cloud deployment (Eucalyptus, OpenNebula, OpenStack, and openQRM) in default configuration. We were able to compromise the security of three cloud installations (Eucalyptus, OpenNebula, and openQRM) One of our attacks (OpenNebula) allowed us to gain root access to VMs even if full perimeter security is enabled, i.e. if the cloud control interface is only reachable from a certain segment of the company's network, and if all network traffic is filtered through a firewall.\u0000 We informed all projects about the attack vectors and proposed mitigations. As a general recommendation, we propose to make web management interfaces for private clouds inaccessible from the Internet, and to include this technical requirement in the definition of a private cloud.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117212107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners 探索具有多个数据所有者的外包k近邻的隐私保护
Pub Date : 2015-07-29 DOI: 10.1145/2808425.2808430
Frank H. Li, Richard Shin, V. Paxson
The k-nearest neighbors (k-NN) algorithm is a popular and effective classification algorithm. Due to its large storage and computational requirements, it is suitable for cloud outsourcing. However, k-NN is often run on sensitive data such as medical records, user images, or personal information. It is important to protect the privacy of data in an outsourced k-NN system. Prior works have all assumed the data owners (who submit data to the outsourced k-NN system) are a single trusted party. However, we observe that in many practical scenarios, there may be multiple mutually distrusting data owners. In this work, we present the first framing and exploration of privacy preservation in an outsourced k-NN system with multiple data owners. We consider the various threat models introduced by this modification. We discover that under a particularly practical threat model that covers numerous scenarios, there exists a set of adaptive attacks that breach the data privacy of any exact k-NN system. The vulnerability is a result of the mathematical properties of k-NN and its output. Thus, we propose a privacy-preserving alternative system supporting kernel density estimation using a Gaussian kernel, a classification algorithm from the same family as k-NN. In many applications, this similar algorithm serves as a good substitute for k-NN. We additionally investigate solutions for other threat models, often through extensions on prior single data owner systems.
k近邻(k-NN)算法是一种流行且有效的分类算法。由于其存储和计算需求大,因此适合云外包。然而,k-NN通常运行在敏感数据上,如医疗记录、用户图像或个人信息。在一个外包的k-NN系统中,保护数据的隐私是非常重要的。之前的工作都假设数据所有者(向外包k-NN系统提交数据的人)是一个受信任的单一方。然而,我们观察到,在许多实际场景中,可能存在多个互不信任的数据所有者。在这项工作中,我们首次提出了具有多个数据所有者的外包k-NN系统中隐私保护的框架和探索。我们考虑了这种修改引入的各种威胁模型。我们发现,在一个特别实用的威胁模型下,涵盖了许多场景,存在一组自适应攻击,这些攻击会破坏任何精确k-NN系统的数据隐私。漏洞是由k-NN的数学特性及其输出结果决定的。因此,我们提出了一个隐私保护的替代系统,支持使用高斯核的核密度估计,高斯核是与k-NN相同家族的分类算法。在许多应用中,这种类似的算法可以很好地替代k-NN。此外,我们还研究其他威胁模型的解决方案,通常是通过扩展先前的单一数据所有者系统。
{"title":"Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners","authors":"Frank H. Li, Richard Shin, V. Paxson","doi":"10.1145/2808425.2808430","DOIUrl":"https://doi.org/10.1145/2808425.2808430","url":null,"abstract":"The k-nearest neighbors (k-NN) algorithm is a popular and effective classification algorithm. Due to its large storage and computational requirements, it is suitable for cloud outsourcing. However, k-NN is often run on sensitive data such as medical records, user images, or personal information. It is important to protect the privacy of data in an outsourced k-NN system. Prior works have all assumed the data owners (who submit data to the outsourced k-NN system) are a single trusted party. However, we observe that in many practical scenarios, there may be multiple mutually distrusting data owners. In this work, we present the first framing and exploration of privacy preservation in an outsourced k-NN system with multiple data owners. We consider the various threat models introduced by this modification. We discover that under a particularly practical threat model that covers numerous scenarios, there exists a set of adaptive attacks that breach the data privacy of any exact k-NN system. The vulnerability is a result of the mathematical properties of k-NN and its output. Thus, we propose a privacy-preserving alternative system supporting kernel density estimation using a Gaussian kernel, a classification algorithm from the same family as k-NN. In many applications, this similar algorithm serves as a good substitute for k-NN. We additionally investigate solutions for other threat models, often through extensions on prior single data owner systems.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133916799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Fast dynamic extracted honeypots in cloud computing 云计算中的快速动态蜜罐提取
Pub Date : 2012-10-19 DOI: 10.1145/2381913.2381916
Sebastian Biedermann, M. Mink, S. Katzenbeisser
In this paper, we describe the design, the implementation and the evaluation of a dynamic honeypot architecture which can be offered as an additional security service for cloud users in a cloud that offers Infrastructure-as-a-Service (IaaS). Honeypots can protect original systems while revealing new and unknown attacks at the same time. The proposed dynamic honeypot architecture detects potential attacks in the initial phases and delays these attacks until a new honeypot virtual machine (VM) is extracted from the original VM which is under attack. The extraction process is a modifying VM live cloning process which leaves sensible data behind and prevents internal data loss. This way, the newly created honeypot VM runs the same software in exactly the same up-to-date configuration. The honeypot controller redirects the delayed attack to the extracted honeypot VM and analyses its impact without risking the integrity of the original target VM. The proposed architecture benefits from the flexibility and adaptability of the cloud. It efficiently protects VMs of cloud users from contemporary network attacks while only few additional cloud resources are temporarily needed. The architecture deceives and misleads an attacker or an attacking source but does not influence the normal work-flow of the original VMs in the cloud. Based on a defined reporting format, cloud users can learn from attacks which have targeted their VMs and discover current misconfigurations and unknown vulnerabilities.
在本文中,我们描述了动态蜜罐架构的设计、实现和评估,该架构可以作为提供基础设施即服务(IaaS)的云中的云用户提供额外的安全服务。蜜罐可以保护原有系统,同时暴露新的和未知的攻击。提出的动态蜜罐架构在初始阶段检测到潜在的攻击,并延迟攻击,直到从受攻击的原始虚拟机中提取出新的蜜罐虚拟机。提取过程是一个修改虚拟机的实时克隆过程,可以保留合理的数据,防止内部数据丢失。这样,新创建的蜜罐虚拟机在完全相同的最新配置中运行相同的软件。蜜罐控制器在不影响原始目标虚拟机完整性的前提下,将延迟攻击重定向到提取的蜜罐虚拟机,并分析其影响。所建议的体系结构受益于云的灵活性和适应性。它可以有效地保护云用户的虚拟机免受当代网络攻击,同时只需要少量额外的云资源。该架构可以欺骗和误导攻击者或攻击源,但不影响云中原有虚拟机的正常工作流程。基于定义的报告格式,云用户可以从针对其虚拟机的攻击中学习,并发现当前的错误配置和未知漏洞。
{"title":"Fast dynamic extracted honeypots in cloud computing","authors":"Sebastian Biedermann, M. Mink, S. Katzenbeisser","doi":"10.1145/2381913.2381916","DOIUrl":"https://doi.org/10.1145/2381913.2381916","url":null,"abstract":"In this paper, we describe the design, the implementation and the evaluation of a dynamic honeypot architecture which can be offered as an additional security service for cloud users in a cloud that offers Infrastructure-as-a-Service (IaaS). Honeypots can protect original systems while revealing new and unknown attacks at the same time. The proposed dynamic honeypot architecture detects potential attacks in the initial phases and delays these attacks until a new honeypot virtual machine (VM) is extracted from the original VM which is under attack. The extraction process is a modifying VM live cloning process which leaves sensible data behind and prevents internal data loss. This way, the newly created honeypot VM runs the same software in exactly the same up-to-date configuration. The honeypot controller redirects the delayed attack to the extracted honeypot VM and analyses its impact without risking the integrity of the original target VM. The proposed architecture benefits from the flexibility and adaptability of the cloud. It efficiently protects VMs of cloud users from contemporary network attacks while only few additional cloud resources are temporarily needed. The architecture deceives and misleads an attacker or an attacking source but does not influence the normal work-flow of the original VMs in the cloud. Based on a defined reporting format, cloud users can learn from attacks which have targeted their VMs and discover current misconfigurations and unknown vulnerabilities.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127352016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Managing trust and secrecy in identity management clouds 在身份管理云中管理信任和保密
Pub Date : 2012-10-19 DOI: 10.1145/2381913.2381933
Apurva Kumar
User management services were one of the first to be offloaded to third party cloud vendors. Today, a large number of service providers rely on trusted identity providers for managing users and their resources. At the core of these interactions involving multiple providers are a set of web-based workflows that have emerged as de-facto standards. In this paper, we propose a framework especially addressing needs of analyzing security in such web protocols. To analyze trust between collaborating service providers on the web, we extend the well-known BAN logic. We study secrecy properties to examine security of user identity management across multiple domains, using a SAT based model-checking approach. The result is a hybrid approach that inherits simplicity and intuitive appeal of belief logics without being affected by soundness problems associated with these logics. We illustrate the method through analysis of a premier web identity management protocol where we use our method to automatically discover a new attack trace.
用户管理服务是第一批卸载给第三方云供应商的服务之一。如今,大量的服务提供者依赖于可信身份提供者来管理用户及其资源。这些涉及多个提供者的交互的核心是一组基于web的工作流,它们已经成为事实上的标准。在本文中,我们提出了一个专门针对这些web协议的安全分析需求的框架。为了分析网络上协作服务提供者之间的信任,我们扩展了众所周知的BAN逻辑。我们使用基于SAT的模型检查方法研究保密属性以检查跨多个域的用户身份管理的安全性。结果是一种混合方法,继承了信仰逻辑的简单性和直观吸引力,而不受与这些逻辑相关的可靠性问题的影响。我们通过分析主要的web身份管理协议来说明该方法,在该协议中我们使用我们的方法来自动发现新的攻击痕迹。
{"title":"Managing trust and secrecy in identity management clouds","authors":"Apurva Kumar","doi":"10.1145/2381913.2381933","DOIUrl":"https://doi.org/10.1145/2381913.2381933","url":null,"abstract":"User management services were one of the first to be offloaded to third party cloud vendors. Today, a large number of service providers rely on trusted identity providers for managing users and their resources. At the core of these interactions involving multiple providers are a set of web-based workflows that have emerged as de-facto standards. In this paper, we propose a framework especially addressing needs of analyzing security in such web protocols. To analyze trust between collaborating service providers on the web, we extend the well-known BAN logic. We study secrecy properties to examine security of user identity management across multiple domains, using a SAT based model-checking approach. The result is a hybrid approach that inherits simplicity and intuitive appeal of belief logics without being affected by soundness problems associated with these logics. We illustrate the method through analysis of a premier web identity management protocol where we use our method to automatically discover a new attack trace.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133783550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Cloud Computing Security Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1