Toggle Main Menu Toggle Search

ePrints

Proactive Security Analysis of Changes in Virtualized Infrastructure.

Lookup NU author(s): Dr Thomas Gross

Downloads

Full text for this publication is not currently held within this repository. Alternative links are provided below where available.


Abstract

The pervasiveness of cloud computing can be attributed to its scale and elasticity. However, the operational complexity of the underlying cloud infrastructure is high, due to its dynamics, multi-tenancy, and size. Misconfigurations and insider attacks carry significant operational and security risks, such as breaches in tenant isolation put both the infrastructure provider and the consumers at risk. We tackle this challenge by establishing a practical security system, called Weatherman, that proactively analyzes changes induced by management operations with respect to security policies. We achieve this by contributing the first formal model of cloud management operations that captures their impact on the infrastructure in the form of graph transformations. Our approach combines such a model of operations with an information flow analysis suited for isolation as well as a policy verifier for a variety of security and operational policies. Our system provides a run-time enforcement of infrastructure security policies, as well as a what-if analysis for change planning.


Publication metadata

Author(s): Bleikertz S, Gross T, Mödersheim S, Vogel C

Publication type: Conference Proceedings (inc. Abstract)

Conference Name: 31st Annual Computer Security Applications Conference (ACSAC'2015)

Year of Conference: 2015

Pages: 51-60

Acceptance date: 17/08/2015

Publisher: ACM Press

URL: http://dx.doi.org/10.1145/2818000.2818034

DOI: 10.1145/2818000.2818034

Library holdings: Search Newcastle University Library for this item

Series Title: Proceedings of the 31st Annual Computer Security Applications Conference (ACSAC'2015)

ISBN: 9781450336826


Actions

Link to this publication


Share