ISOTOP

Author:

Madi Taous1,Jarraya Yosr2,Alimohammadifar Amir1,Majumdar Suryadipta1,Wang Yushun1,Pourzandi Makan2,Wang Lingyu1,Debbabi Mourad1

Affiliation:

1. CIISE, Concordia University, Canada

2. Ericsson Security Research, Canada

Abstract

Multi-tenancy in the cloud is a double-edged sword. While it enables cost-effective resource sharing, it increases security risks for the hosted applications. Indeed, multiplexing virtual resources belonging to different tenants on the same physical substrate may lead to critical security concerns such as cross-tenants data leakage and denial of service. Particularly, virtual networks isolation failures are among the foremost security concerns in the cloud. To remedy these, automated tools are needed to verify security mechanisms compliance with relevant security policies and standards. However, auditing virtual networks isolation is challenging due to the dynamic and layered nature of the cloud. Particularly, inconsistencies in network isolation mechanisms across cloud-stack layers, namely, the infrastructure management and the implementation layers, may lead to virtual networks isolation breaches that are undetectable at a single layer. In this article, we propose an offline automated framework for auditing consistent isolation between virtual networks in OpenStack-managed cloud spanning over overlay and layer 2 by considering both cloud layers’ views. To capture the semantics of the audited data and its relation to consistent isolation requirement, we devise a multi-layered model for data related to each cloud-stack layer’s view. Furthermore, we integrate our auditing system into OpenStack, and present our experimental results on assessing several properties related to virtual network isolation and consistency. Our results show that our approach can be successfully used to detect virtual network isolation breaches for large OpenStack-based data centers in reasonable time.

Publisher

Association for Computing Machinery (ACM)

Subject

Safety, Risk, Reliability and Quality,General Computer Science

Reference57 articles.

1. ISO. org. 2013. ISO/IEC 11889-1:2009. ISO. org. 2013. ISO/IEC 11889-1:2009.

2. Model Checking Distributed Mandatory Access Control Policies

3. Amazon. 2017. Amazon Virtual Private Cloud. Retrieved from https://aws.amazon.com/vpc. Amazon. 2017. Amazon Virtual Private Cloud. Retrieved from https://aws.amazon.com/vpc.

4. Mordechai Ben-Ari. 2012. Mathematical Logic for Computer Science. Springer Science 8 Business Media London. Mordechai Ben-Ari. 2012. Mathematical Logic for Computer Science. Springer Science 8 Business Media London.

5. Sören Bleikertz. 2010. Automated Security Analysis of Infrastructure Clouds. Master’s thesis. Technical University of Denmark and Norwegian University of Science and Technology. Sören Bleikertz. 2010. Automated Security Analysis of Infrastructure Clouds. Master’s thesis. Technical University of Denmark and Norwegian University of Science and Technology.

Cited by 15 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3