Towards Security-Aware Microservices: On Extracting Endpoint Data Access Operations to Determine Access Rights

被引:1
|
作者
Abdelfattah, Amr S. [1 ]
Schiewe, Micah [1 ]
Curtis, Jacob [1 ]
Cerny, Tomas [1 ]
Song, Eunjee [1 ]
机构
[1] Baylor Univ, Comp Sci, ECS, One Bear Pl 97141, Waco, TX 76798 USA
来源
PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2023 | 2023年
基金
美国国家科学基金会;
关键词
Static Analysis; Microservices; Access Rights; CHALLENGES;
D O I
10.5220/0011707500003488
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security policies are typically defined centrally for a particular system. However, the current mainstream architecture - microservices - introduces decentralization with self-contained interacting parts. This brings better evolution autonomy to individual microservices but introduces new challenges with consistency. The most basic security perspective is the setting of access rights; we typically enforce access rights at system endpoints. Given the self-contained and decentralized microservice nature, each microservice has to implement these policies individually. Considering that different development teams are involved in microservice development, likely the access rights are not consistently implemented across the system. Moreover, as the system evolves, it can quickly become cumbersome to identify a holistic view of the full set of access rights applied in the system. Various issues can emerge from inconsistent settings and potentially lead to security vulnerabilities and unintended bugs, such as incorrectly granting write or read access to system data. This paper presents an approach aiding a human-centered access right analysis of system endpoints in microservices. It identifies the system data that a particular endpoint accesses throughout its call paths and determines which operations are performed on these data across the call paths. In addition, it takes into account inter-service communication across microservices, which brings a great and novel instrument to practitioners who would otherwise need to perform a thorough code review of self-contained codebases to extract such information from the system. The presented approach has broad potential related to security analysis, further detailed in the paper.
引用
收藏
页码:15 / 23
页数:9
相关论文
共 13 条
  • [1] Security-Aware SoC Test Access Mechanisms
    Rosenfeld, Kurt
    Karri, Ramesh
    2011 IEEE 29TH VLSI TEST SYMPOSIUM (VTS), 2011, : 100 - 104
  • [2] Enhanced security-aware technique and ontology data access control in cloud computing
    Kiran, Gangasandra Mahadevaiah
    Nalini, Narasimhaiah
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (15)
  • [3] Blockchain-based composite access control and secret sharing-based data distribution for security-aware deployments
    Pampattiwar, Kalyani Nikhilesh
    Chavan, Pallavi Vijay
    International Journal of Information and Computer Security, 2024, 25 (3-4) : 292 - 332
  • [4] Security-Aware Attribute-Based Access Control for Fog-Based Eldercare System
    Yin, Luona
    Zhang, Aiqing
    Ye, Xinrong
    Wang, Lei
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 2680 - 2684
  • [5] Access rights - Protect access to your data or lose it: Serious misconceptions about information security
    Lewis, Nick
    Computer Fraud and Security, 2012, 2012 (11): : 8 - 10
  • [6] Security-Aware Information Dissemination With Fine-Grained Access Control in Cooperative Multi-RSU of VANETs
    Liu, Xuejiao
    Chen, Wei
    Xia, Yingjie
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (03) : 2170 - 2179
  • [7] Towards Analytics Aware Ontology Based Access to Static and Streaming Data
    Kharlamov, Evgeny
    Kotidis, Yannis
    Mailis, Theofilos
    ChristianNeuenstadt
    Nikolaou, Charalampos
    Oezcep, Oezguer
    Svingos, Christoforos
    Zheleznyakov, Dmitriy
    Brandt, Sebastian
    Horrocks, Ian
    Ioannidis, Yannis
    Lamparter, Steffen
    Moeller, Ralf
    SEMANTIC WEB - ISWC 2016, PT II, 2016, 9982 : 344 - 362
  • [8] Towards a New Security Approach Based on Heartbeat Authentication to Ensure Security of Cloud Data Access
    Hammami, Hamza
    Brahmi, Hanen
    Ben Yahia, Sadok
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 37 - 43
  • [9] Towards faster data access: Seek operations in MEMS-based storage devices
    Sebastian, A.
    Pantazi, A.
    Cherubini, G.
    Lantz, M.
    Rothuizen, H.
    Pozidis, H.
    Eleftheriou, E.
    PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON CONTROL APPLICATIONS, VOLS 1-4, 2006, : 142 - +
  • [10] Towards Location-Aware Access Control and Data Privacy in Inter-Cloud Communications
    Abwnawar, Nasser
    Janicke, Helge
    Smith, Richard
    17TH IEEE INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES - IEEE EUROCON 2017 CONFERENCE PROCEEDINGS, 2017, : 739 - 744