PIMS: An Efficient Process Integrity Monitoring System Based on Blockchain and Trusted Computing in Cloud-Native Context

被引:2
作者
Yang, Miaomiao [1 ,2 ]
Huang, Guosheng [1 ,2 ]
Liu, Junwei [3 ]
Gui, Yanshuang [1 ,2 ]
Wang, Qixu [1 ,2 ]
Chen, Xingshu [1 ,2 ]
机构
[1] Sichuan Univ, Cyber Sci Res Inst, Chengdu 610207, Peoples R China
[2] Sichuan Univ, Cyber Sci & Engn, Chengdu 610207, Peoples R China
[3] China Mobile Suzhou Software Technol, China Mobile, Suzhou 215163, Peoples R China
来源
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES | 2023年 / 136卷 / 02期
关键词
Blockchain-based protection; dynamic monitoring; remote attestation; integrity verification; SCHEME; VERIFICATION; FRAMEWORK; SECURITY; DOCKER;
D O I
10.32604/cmes.2023.026371
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the advantages of lightweight and high resource utilization, cloud-native technology with containers as the core is gradually becoming the mainstream technical architecture for information infrastructure. However, malware attacks such as Doki and Symbiote threaten the container runtime's security. Malware initiates various types of runtime anomalies based on process form (e.g., modifying the process of a container, and opening the external ports). Fortunately, dynamic monitoring mechanisms have proven to be a feasible solution for verifying the trusted state of containers at runtime. Nevertheless, the current routine dynamic monitoring mechanisms for baseline data protection are still based on strong security assumptions. As a result, the existing dynamic monitoring mechanism is still not practical enough. To ensure the trustworthiness of the baseline value data and, simultaneously, to achieve the integrity verification of the monitored process, we combine blockchain and trusted computing to propose a process integrity monitoring system named IPMS. Firstly, the hardware TPM 2.0 module is applied to construct a trusted security foundation for the integrity of the process code segment due to its tamper-proof feature. Then, design a new format for storing measurement logs, easily distinguishing files with the same name in different containers from log information. Meanwhile, the baseline value data is stored on the blockchain to avoid malicious damage. Finally, trusted computing technology is used to perform fine-grained integrity measurement and remote attestation of processes in a container, detect abnormal containers in time and control them. We have implemented a prototype system and performed extensive simulation experiments to test and analyze the functionality and performance of the PIMS. Experimental results show that PIMS can accurately and efficiently detect tampered processes with only 3.57% performance loss to the container.
引用
收藏
页码:1879 / 1898
页数:20
相关论文
共 42 条
  • [1] Angelis S. D., 2018, IT C CYB SEC MIL IT
  • [2] The state-of-the-art in container technologies: Application, orchestration and security
    Casalicchio, Emiliano
    Iannucci, Stefano
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (17)
  • [3] A performance comparison of linux containers and virtual machines using Docker and KVM
    Chae, MinSu
    Lee, HwaMin
    Lee, Kiyeol
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1765 - 1775
  • [4] Audio-Based Security Techniques for Secure Device-to-Device Communications
    Chen, Dajiang
    Zhang, Ning
    Wu, Huici
    Zhang, Kuan
    Lu, Rongxing
    Guizani, Mohsen
    [J]. IEEE NETWORK, 2022, 36 (06): : 54 - 59
  • [5] Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT
    Chen, Dajiang
    Wang, Hao
    Zhang, Ning
    Nie, Xuyun
    Dai, Hong-Ning
    Zhang, Kuan
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18) : 17265 - 17279
  • [6] FileWallet: A File Management System Based on IPFS and Hyperledger Fabric
    Chen, Jienan
    Zhang, Chuang
    Yan, Yu
    Liu, Yuan
    [J]. CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2022, 130 (02): : 949 - 966
  • [7] Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data
    Chene, Hefeng
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    Chen, Long-Sheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [8] Remote Attestation of Large-scale Virtual Machines in the Cloud Data Center
    Chene, Jie
    Zhang, Kun
    Tu, Bibo
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 180 - 187
  • [9] From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models
    Compastie, Maxime
    Badonnel, Remi
    Festor, Olivier
    He, Ruan
    [J]. COMPUTERS & SECURITY, 2020, 97
  • [10] Integrity verification of Docker containers for a lightweight cloud environment
    De Benedictis, Marco
    Lioy, Antonio
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 : 236 - 246