首页 > 最新文献

Cloud Computing Security Workshop最新文献

英文 中文
Venus: verification for untrusted cloud storage 金星:验证不可信的云存储
Pub Date : 2010-10-08 DOI: 10.1145/1866835.1866841
A. Shraer, C. Cachin, Asaf Cidon, I. Keidar, Yan Michalevsky, Dani Shaket
This paper presents Venus, a service for securing user interaction with untrusted cloud storage. Specifically, Venus guarantees integrity and consistency for applications accessing a key-based object store service, without requiring trusted components or changes to the storage provider. Venus completes all operations optimistically, guaranteeing data integrity. It then verifies operation consistency and notifies the application. Whenever either integrity or consistency is violated, Venus alerts the application. We implemented Venus and evaluated it with Amazon S3 commodity storage service. The evaluation shows that it adds no noticeable overhead to storage operations.
本文介绍了Venus,一种用于保护用户与不可信云存储交互的服务。具体来说,Venus保证了访问基于密钥的对象存储服务的应用程序的完整性和一致性,而不需要可信组件或对存储提供者进行更改。Venus乐观地完成了所有操作,保证了数据的完整性。然后验证操作一致性并通知应用程序。只要违反了完整性或一致性,Venus就会向应用程序发出警报。我们实现了Venus,并使用Amazon S3商品存储服务对其进行了评估。计算结果表明,它没有给存储操作增加明显的开销。
{"title":"Venus: verification for untrusted cloud storage","authors":"A. Shraer, C. Cachin, Asaf Cidon, I. Keidar, Yan Michalevsky, Dani Shaket","doi":"10.1145/1866835.1866841","DOIUrl":"https://doi.org/10.1145/1866835.1866841","url":null,"abstract":"This paper presents Venus, a service for securing user interaction with untrusted cloud storage. Specifically, Venus guarantees integrity and consistency for applications accessing a key-based object store service, without requiring trusted components or changes to the storage provider. Venus completes all operations optimistically, guaranteeing data integrity. It then verifies operation consistency and notifies the application. Whenever either integrity or consistency is violated, Venus alerts the application. We implemented Venus and evaluated it with Amazon S3 commodity storage service. The evaluation shows that it adds no noticeable overhead to storage operations.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122527486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 137
Towards incident handling in the cloud: challenges and approaches 面向云中的事件处理:挑战和方法
Pub Date : 2010-10-08 DOI: 10.1145/1866835.1866850
Bernd Grobauer, T. Schreck
Security incident handling, an integral part of security management, treats detection and analysis of security incidents as well as the subsequent response (i.e., containment, eradication, and recovery.) Existing processes and methods for incident handling are geared towards infrastructures and operational models that will be increasingly outdated by cloud computing. This paper examines, how the changes introduced by cloud computing influence the incident handling process. It identifies problems that cloud customers encounter in each of the incident handling steps and provides possible approaches and corresponding challenges. The identified approaches provide guidance for cloud customers and cloud service providers towards effective incident handling in the cloud; the identified challenges may serve as basis for a research agenda in cloud incident handling.
安全事件处理是安全管理的一个组成部分,处理安全事件的检测和分析以及随后的响应(即遏制、根除和恢复)。事件处理的现有流程和方法是面向基础设施和操作模型的,这些基础设施和操作模型将因云计算而日益过时。本文探讨了云计算带来的变化如何影响事件处理过程。它确定了云客户在每个事件处理步骤中遇到的问题,并提供了可能的方法和相应的挑战。确定的方法为云客户和云服务提供商在云中有效处理事件提供了指导;确定的挑战可以作为云事件处理研究议程的基础。
{"title":"Towards incident handling in the cloud: challenges and approaches","authors":"Bernd Grobauer, T. Schreck","doi":"10.1145/1866835.1866850","DOIUrl":"https://doi.org/10.1145/1866835.1866850","url":null,"abstract":"Security incident handling, an integral part of security management, treats detection and analysis of security incidents as well as the subsequent response (i.e., containment, eradication, and recovery.) Existing processes and methods for incident handling are geared towards infrastructures and operational models that will be increasingly outdated by cloud computing. This paper examines, how the changes introduced by cloud computing influence the incident handling process. It identifies problems that cloud customers encounter in each of the incident handling steps and provides possible approaches and corresponding challenges. The identified approaches provide guidance for cloud customers and cloud service providers towards effective incident handling in the cloud; the identified challenges may serve as basis for a research agenda in cloud incident handling.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129930792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
Determinating timing channels in compute clouds 确定计算云中的时序通道
Pub Date : 2010-03-27 DOI: 10.1145/1866835.1866854
Amittai Aviram, Sen Hu, B. Ford, R. Gummadi
Timing side-channels represent an insidious security challenge for cloud computing, because: (a) massive parallelism in the cloud makes timing channels pervasive and hard to control; (b) timing channels enable one customer to steal information from another without leaving a trail or raising alarms; (c) only the cloud provider can feasibly detect and report such attacks, but the provider's incentives are not to; and (d) resource partitioning schemes for timing channel control undermine statistical sharing efficiency, and, with it, the cloud computing business model. We propose a new approach to timing channel control, using provider-enforced deterministic execution instead of resource partitioning to eliminate timing channels within a shared cloud domain. Provider-enforced determinism prevents execution timing from affecting the results of a compute task, however large or parallel, ensuring that a task's outputs leak no timing information apart from explicit timing inputs and total compute duration. Experiments with a prototype OS for deterministic cloud computing suggest that such an approach may be practical and efficient. The OS supports deterministic versions of familiar APIs such as processes, threads, shared memory, and file systems, and runs coarse-grained parallel tasks as efficiently and scalably as current timing channel-ridden systems.
定时侧信道对云计算来说是一个潜在的安全挑战,因为:(a)云中的大规模并行性使得定时信道无处不在,难以控制;(b)定时通道使一个客户能够在不留下痕迹或发出警报的情况下窃取另一个客户的信息;(c)只有云提供商能够切实检测并报告此类攻击,但云提供商的激励措施并非如此;(d)用于时序通道控制的资源分区方案破坏了统计共享效率,从而破坏了云计算商业模式。我们提出了一种新的时间通道控制方法,使用提供者强制的确定性执行而不是资源分区来消除共享云域中的时间通道。提供程序强制的确定性防止执行计时影响计算任务的结果,无论该任务有多大或多并行,确保任务的输出除了显式计时输入和总计算持续时间外不会泄漏计时信息。对确定性云计算的原型操作系统的实验表明,这种方法可能是实用和有效的。该操作系统支持我们熟悉的api(如进程、线程、共享内存和文件系统)的确定性版本,并能像当前的定时通道系统一样高效、可扩展地运行粗粒度并行任务。
{"title":"Determinating timing channels in compute clouds","authors":"Amittai Aviram, Sen Hu, B. Ford, R. Gummadi","doi":"10.1145/1866835.1866854","DOIUrl":"https://doi.org/10.1145/1866835.1866854","url":null,"abstract":"Timing side-channels represent an insidious security challenge for cloud computing, because: (a) massive parallelism in the cloud makes timing channels pervasive and hard to control; (b) timing channels enable one customer to steal information from another without leaving a trail or raising alarms; (c) only the cloud provider can feasibly detect and report such attacks, but the provider's incentives are not to; and (d) resource partitioning schemes for timing channel control undermine statistical sharing efficiency, and, with it, the cloud computing business model. We propose a new approach to timing channel control, using provider-enforced deterministic execution instead of resource partitioning to eliminate timing channels within a shared cloud domain. Provider-enforced determinism prevents execution timing from affecting the results of a compute task, however large or parallel, ensuring that a task's outputs leak no timing information apart from explicit timing inputs and total compute duration. Experiments with a prototype OS for deterministic cloud computing suggest that such an approach may be practical and efficient. The OS supports deterministic versions of familiar APIs such as processes, threads, shared memory, and file systems, and runs coarse-grained parallel tasks as efficiently and scalably as current timing channel-ridden systems.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126863588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 153
Secure file system services for web 2.0 applications 用于web 2.0应用程序的安全文件系统服务
Pub Date : 2009-11-13 DOI: 10.1145/1655008.1655011
F. Hsu, Hao Chen
We present a design for a file system that provides a secure file storage service for Web 2.0 applications. Currently, each Web application stores its own user data. This not only burdens the applications with storing, managing, and securing user data but also deprives users from controlling their own data. With recent proposals of secure client-side cross-domain communication mechanisms, we can provide an independent file system service to Web applications. This service returns the control over user data back to the users, where users can share or restrict access to their files as they wish, and relieves web application servers from the contractual or regulatory obligation of safeguarding user data.
我们提出了一个文件系统的设计,该系统为Web 2.0应用程序提供安全的文件存储服务。目前,每个Web应用程序都存储自己的用户数据。这不仅给应用程序增加了存储、管理和保护用户数据的负担,而且剥夺了用户控制自己数据的权利。通过最近提出的安全客户端跨域通信机制,我们可以为Web应用程序提供独立的文件系统服务。该服务将对用户数据的控制权返回给用户,用户可以根据自己的意愿共享或限制对其文件的访问,并将web应用服务器从保护用户数据的合同或监管义务中解脱出来。
{"title":"Secure file system services for web 2.0 applications","authors":"F. Hsu, Hao Chen","doi":"10.1145/1655008.1655011","DOIUrl":"https://doi.org/10.1145/1655008.1655011","url":null,"abstract":"We present a design for a file system that provides a secure file storage service for Web 2.0 applications. Currently, each Web application stores its own user data. This not only burdens the applications with storing, managing, and securing user data but also deprives users from controlling their own data. With recent proposals of secure client-side cross-domain communication mechanisms, we can provide an independent file system service to Web applications. This service returns the control over user data back to the users, where users can share or restrict access to their files as they wish, and relieves web application servers from the contractual or regulatory obligation of safeguarding user data.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114472472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
TrackBack spam: abuse and prevention TrackBack垃圾邮件:滥用和预防
Pub Date : 2009-11-13 DOI: 10.1145/1655008.1655010
Elie Bursztein, Peifung E. Lam, John C. Mitchell
Contemporary blogs receive comments and TrackBacks, which result in cross-references between blogs. We conducted a longitudinal study of TrackBack spam, collecting and analyzing almost 10 million samples from a massive spam campaign over a one-year period. Unlike common delivery of email spam, the spammers did not use bots, but took advantage of an official Chinese site as a relay. Based on our analysis of TrackBack misuse found in the wild, we propose an authenticated TrackBack mechanism that defends against TrackBack spam even if attackers use a very large number of different source addresses and generate unique URLs for each TrackBack blog.
当代博客接收评论和trackback,这导致博客之间的交叉引用。我们对TrackBack垃圾邮件进行了纵向研究,在一年的时间里从大规模的垃圾邮件活动中收集和分析了近1000万个样本。与普通的垃圾邮件发送不同,垃圾邮件发送者没有使用机器人,而是利用中国官方网站作为中继。基于我们对野外发现的TrackBack滥用的分析,我们提出了一种经过身份验证的TrackBack机制,即使攻击者使用大量不同的源地址并为每个TrackBack博客生成唯一的url,也可以防御TrackBack垃圾邮件。
{"title":"TrackBack spam: abuse and prevention","authors":"Elie Bursztein, Peifung E. Lam, John C. Mitchell","doi":"10.1145/1655008.1655010","DOIUrl":"https://doi.org/10.1145/1655008.1655010","url":null,"abstract":"Contemporary blogs receive comments and TrackBacks, which result in cross-references between blogs. We conducted a longitudinal study of TrackBack spam, collecting and analyzing almost 10 million samples from a massive spam campaign over a one-year period. Unlike common delivery of email spam, the spammers did not use bots, but took advantage of an official Chinese site as a relay. Based on our analysis of TrackBack misuse found in the wild, we propose an authenticated TrackBack mechanism that defends against TrackBack spam even if attackers use a very large number of different source addresses and generate unique URLs for each TrackBack blog.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132491041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Browser interfaces and extended validation SSL certificates: an empirical study 浏览器接口和扩展验证SSL证书:实证研究
Pub Date : 2009-11-13 DOI: 10.1145/1655008.1655012
R. Biddle, P. V. Oorschot, Andrew S. Patrick, J. Sobey, Tara Whalen
There has been a loss of confidence in the security provided by SSL certificates and browser interfaces in the face of various attacks. As one response, basic SSL server certificates are being demoted to second-class status in conjunction with the introduction of Extended Validation (EV) SSL certificates. Unfortunately, EV SSL certificates may complicate the already difficult design challenge of effectively conveying certificate information to the average user. This study explores the interfaces related to SSL certificates in the most widely deployed browser (Internet Explorer 7), proposes an alternative set of interface dialogs, and compares their effectiveness through a user study involving 40 participants. The alternative interface was found to offer statistically significant improvements in confidence, ease of finding information, and ease of understanding. Such results from a modest re-design effort suggest considerable room for improvement in the user interfaces of browsers today. This work motivates further study of whether EV SSL certificates offer a robust foundation for improving Internet trust, or a further compromise to usable security for ordinary users.
面对各种攻击,人们对SSL证书和浏览器接口提供的安全性失去了信心。作为一种回应,随着扩展验证(EV) SSL证书的引入,基本SSL服务器证书被降级为二等证书。不幸的是,EV SSL证书可能会使有效地向普通用户传递证书信息这一已经很困难的设计挑战复杂化。本研究探讨了在最广泛部署的浏览器(Internet Explorer 7)中与SSL证书相关的界面,提出了一组可选择的界面对话框,并通过涉及40名参与者的用户研究比较了它们的有效性。研究发现,替代界面在信心、查找信息的便利性和理解便利性方面提供了统计上显著的改进。通过适度的重新设计所得到的结果表明,目前浏览器的用户界面还有很大的改进空间。这项工作促使人们进一步研究EV SSL证书是否为提高互联网信任提供了坚实的基础,还是进一步损害了普通用户的可用安全性。
{"title":"Browser interfaces and extended validation SSL certificates: an empirical study","authors":"R. Biddle, P. V. Oorschot, Andrew S. Patrick, J. Sobey, Tara Whalen","doi":"10.1145/1655008.1655012","DOIUrl":"https://doi.org/10.1145/1655008.1655012","url":null,"abstract":"There has been a loss of confidence in the security provided by SSL certificates and browser interfaces in the face of various attacks. As one response, basic SSL server certificates are being demoted to second-class status in conjunction with the introduction of Extended Validation (EV) SSL certificates. Unfortunately, EV SSL certificates may complicate the already difficult design challenge of effectively conveying certificate information to the average user. This study explores the interfaces related to SSL certificates in the most widely deployed browser (Internet Explorer 7), proposes an alternative set of interface dialogs, and compares their effectiveness through a user study involving 40 participants. The alternative interface was found to offer statistically significant improvements in confidence, ease of finding information, and ease of understanding. Such results from a modest re-design effort suggest considerable room for improvement in the user interfaces of browsers today. This work motivates further study of whether EV SSL certificates offer a robust foundation for improving Internet trust, or a further compromise to usable security for ordinary users.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127712312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
Secure and efficient access to outsourced data 安全有效地访问外包数据
Pub Date : 2009-11-13 DOI: 10.1145/1655008.1655016
Weichao Wang, Zhiwei Li, Rodney Owens, B. Bhargava
Providing secure and efficient access to large scale outsourced data is an important component of cloud computing. In this paper, we propose a mechanism to solve this problem in owner-write-users-read applications. We propose to encrypt every data block with a different key so that flexible cryptography-based access control can be achieved. Through the adoption of key derivation methods, the owner needs to maintain only a few secrets. Analysis shows that the key derivation procedure using hash functions will introduce very limited computation overhead. We propose to use over-encryption and/or lazy revocation to prevent revoked users from getting access to updated data blocks. We design mechanisms to handle both updates to outsourced data and changes in user access rights. We investigate the overhead and safety of the proposed approach, and study mechanisms to improve data access efficiency.
提供对大规模外包数据的安全高效访问是云计算的一个重要组成部分。在本文中,我们提出了一种机制来解决在所有者写用户读应用程序中的这个问题。我们建议使用不同的密钥对每个数据块进行加密,从而实现灵活的基于加密的访问控制。通过采用密钥派生方法,所有者只需要保留很少的秘密。分析表明,使用哈希函数的密钥派生过程将引入非常有限的计算开销。我们建议使用过度加密和/或延迟撤销来防止被撤销的用户访问更新的数据块。我们设计机制来处理外包数据的更新和用户访问权限的更改。我们研究了该方法的开销和安全性,并研究了提高数据访问效率的机制。
{"title":"Secure and efficient access to outsourced data","authors":"Weichao Wang, Zhiwei Li, Rodney Owens, B. Bhargava","doi":"10.1145/1655008.1655016","DOIUrl":"https://doi.org/10.1145/1655008.1655016","url":null,"abstract":"Providing secure and efficient access to large scale outsourced data is an important component of cloud computing. In this paper, we propose a mechanism to solve this problem in owner-write-users-read applications. We propose to encrypt every data block with a different key so that flexible cryptography-based access control can be achieved. Through the adoption of key derivation methods, the owner needs to maintain only a few secrets. Analysis shows that the key derivation procedure using hash functions will introduce very limited computation overhead. We propose to use over-encryption and/or lazy revocation to prevent revoked users from getting access to updated data blocks. We design mechanisms to handle both updates to outsourced data and changes in user access rights. We investigate the overhead and safety of the proposed approach, and study mechanisms to improve data access efficiency.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127871409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 327
Securing elastic applications on mobile devices for cloud computing 为云计算保护移动设备上的弹性应用程序
Pub Date : 2009-11-13 DOI: 10.1145/1655008.1655026
Xinwen Zhang, Joshua Schiffman, S. Gibbs, A. Kunjithapatham, Sangoh Jeong
Cloud computing provides elastic computing infrastructure and resources which enable resource-on-demand and pay-as-you-go utility computing models. We believe that new applications can leverage these models to achieve new features that are not available for legacy applications. In our project we aim to build elastic applications which augment resource-constrained platforms, such as mobile phones, with elastic computing resources from clouds. An elastic application consists of one or more weblets, each of which can be launched on a device or cloud, and can be migrated between them according to dynamic changes of the computing environment or user preferences on the device. This paper overviews the general concept of this new application model, analyzes its unique security requirements, and presents our design considerations to build secure elastic applications. As first steps we propose a solution for authentication and secure session management between weblets running device side and those on the cloud. We then propose secure migration and how to authorize cloud weblets to access sensitive user data such as via external web services. We believe some principles in our solution can be applied in other cloud computing scenarios such as application integration between private and public clouds in an enterprise environment.
云计算提供弹性计算基础设施和资源,支持按需资源和随用随付的效用计算模型。我们相信新的应用程序可以利用这些模型来实现遗留应用程序不可用的新特性。在我们的项目中,我们的目标是构建弹性应用程序,用来自云的弹性计算资源来增强资源受限的平台,比如移动电话。弹性应用程序由一个或多个weblet组成,每个weblet都可以在设备或云上启动,并且可以根据设备上计算环境或用户偏好的动态变化在它们之间迁移。本文概述了这种新应用程序模型的一般概念,分析了其独特的安全需求,并介绍了构建安全弹性应用程序的设计考虑。作为第一步,我们提出了一个在设备端和云上运行的weblet之间进行身份验证和安全会话管理的解决方案。然后,我们提出了安全迁移以及如何授权云weblet访问敏感用户数据(例如通过外部web服务)。我们相信我们解决方案中的一些原则可以应用于其他云计算场景,例如企业环境中私有云和公共云之间的应用程序集成。
{"title":"Securing elastic applications on mobile devices for cloud computing","authors":"Xinwen Zhang, Joshua Schiffman, S. Gibbs, A. Kunjithapatham, Sangoh Jeong","doi":"10.1145/1655008.1655026","DOIUrl":"https://doi.org/10.1145/1655008.1655026","url":null,"abstract":"Cloud computing provides elastic computing infrastructure and resources which enable resource-on-demand and pay-as-you-go utility computing models. We believe that new applications can leverage these models to achieve new features that are not available for legacy applications. In our project we aim to build elastic applications which augment resource-constrained platforms, such as mobile phones, with elastic computing resources from clouds. An elastic application consists of one or more weblets, each of which can be launched on a device or cloud, and can be migrated between them according to dynamic changes of the computing environment or user preferences on the device. This paper overviews the general concept of this new application model, analyzes its unique security requirements, and presents our design considerations to build secure elastic applications. As first steps we propose a solution for authentication and secure session management between weblets running device side and those on the cloud. We then propose secure migration and how to authorize cloud weblets to access sensitive user data such as via external web services. We believe some principles in our solution can be applied in other cloud computing scenarios such as application integration between private and public clouds in an enterprise environment.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129232620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 192
Managing security of virtual machine images in a cloud environment 管理云环境中虚拟机映像的安全性
Pub Date : 2009-11-13 DOI: 10.1145/1655008.1655021
Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, P. Ning
Cloud computing is revolutionizing how information technology resources and services are used and managed but the revolution comes with new security problems. Among these is the problem of securely managing the virtual-machine images that encapsulate each application of the cloud. These images must have high integrity because the initial state of every virtual machine in the cloud is determined by some image. However, as some of the enefits of the cloud depend on users employing images built by third parties, users must also be able to share images safely. This paper explains the new risks that face administrators and users (both image publishers and image retrievers) of a cloud's image repository. To address those risks, we propose an image management system that controls access to images, tracks the provenance of images, and provides users and administrators with efficient image filters and scanners that detect and repair security violations. Filters and scanners achieve efficiency by exploiting redundancy among images; an early implementation of the system shows that this approach scales better than a naive approach that treats each image independently.
云计算正在彻底改变信息技术资源和服务的使用和管理方式,但这场革命也带来了新的安全问题。其中一个问题是安全管理封装云的每个应用程序的虚拟机映像。这些映像必须具有高完整性,因为云中每个虚拟机的初始状态都是由某个映像决定的。但是,由于云的一些好处依赖于使用第三方构建的映像的用户,因此用户还必须能够安全地共享映像。本文解释了云映像存储库的管理员和用户(包括映像发布者和映像检索者)面临的新风险。为了解决这些风险,我们提出了一个图像管理系统,该系统可以控制对图像的访问,跟踪图像的来源,并为用户和管理员提供有效的图像过滤器和扫描仪,以检测和修复违反安全的行为。过滤器和扫描仪通过利用图像之间的冗余来实现效率;系统的早期实现表明,这种方法比独立处理每个图像的朴素方法具有更好的伸缩性。
{"title":"Managing security of virtual machine images in a cloud environment","authors":"Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, P. Ning","doi":"10.1145/1655008.1655021","DOIUrl":"https://doi.org/10.1145/1655008.1655021","url":null,"abstract":"Cloud computing is revolutionizing how information technology resources and services are used and managed but the revolution comes with new security problems. Among these is the problem of securely managing the virtual-machine images that encapsulate each application of the cloud. These images must have high integrity because the initial state of every virtual machine in the cloud is determined by some image. However, as some of the enefits of the cloud depend on users employing images built by third parties, users must also be able to share images safely.\u0000 This paper explains the new risks that face administrators and users (both image publishers and image retrievers) of a cloud's image repository. To address those risks, we propose an image management system that controls access to images, tracks the provenance of images, and provides users and administrators with efficient image filters and scanners that detect and repair security violations. Filters and scanners achieve efficiency by exploiting redundancy among images; an early implementation of the system shows that this approach scales better than a naive approach that treats each image independently.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115381079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 295
Resource management for isolation enhanced cloud services 用于隔离增强云服务的资源管理
Pub Date : 2009-11-13 DOI: 10.1145/1655008.1655019
Himanshu Raj, Ripal Nathuji, Abhishek Singh, P. England
The cloud infrastructure provider (CIP) in a cloud computing platform must provide security and isolation guarantees to a service provider (SP), who builds the service(s) for such a platform. We identify last level cache (LLC) sharing as one of the impediments to finer grain isolation required by a service, and advocate two resource management approaches to provide performance and security isolation in the shared cloud infrastructure - cache hierarchy aware core assignment and page coloring based cache partitioning. Experimental results demonstrate that these approaches are effective in isolating cache interference impacts a VM may have on another VM. We also incorporate these approaches in the resource management (RM) framework of our example cloud infrastructure, which enables the deployment of VMs with isolation enhanced SLAs.
云计算平台中的云基础设施提供商(CIP)必须向为该平台构建服务的服务提供商(SP)提供安全和隔离保证。我们认为最后一级缓存(LLC)共享是实现服务所需的细粒度隔离的障碍之一,并提倡两种资源管理方法来在共享云基础设施中提供性能和安全隔离——缓存层次感知的核心分配和基于页面着色的缓存分区。实验结果表明,这些方法可以有效地隔离一个虚拟机对另一个虚拟机的缓存干扰影响。我们还将这些方法合并到示例云基础架构的资源管理(RM)框架中,该框架支持部署具有隔离增强sla的vm。
{"title":"Resource management for isolation enhanced cloud services","authors":"Himanshu Raj, Ripal Nathuji, Abhishek Singh, P. England","doi":"10.1145/1655008.1655019","DOIUrl":"https://doi.org/10.1145/1655008.1655019","url":null,"abstract":"The cloud infrastructure provider (CIP) in a cloud computing platform must provide security and isolation guarantees to a service provider (SP), who builds the service(s) for such a platform. We identify last level cache (LLC) sharing as one of the impediments to finer grain isolation required by a service, and advocate two resource management approaches to provide performance and security isolation in the shared cloud infrastructure - cache hierarchy aware core assignment and page coloring based cache partitioning. Experimental results demonstrate that these approaches are effective in isolating cache interference impacts a VM may have on another VM. We also incorporate these approaches in the resource management (RM) framework of our example cloud infrastructure, which enables the deployment of VMs with isolation enhanced SLAs.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133712467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 233
期刊
Cloud Computing Security Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1