Man in the Cloud (MITC) Defender: SGX-based User Credential Protection for Synchronization applications in Cloud Computing Platform

被引:12
作者
Liang, Xueping [1 ,2 ,3 ]
Shetty, Sachin [4 ]
Zhang, Lingchen [1 ]
Kamhoua, Charles [5 ]
Kwiat, Kevin [5 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Beijing 100190, Peoples R China
[3] Tennessee State Univ, Coll Engn, Nashville, TN 37209 USA
[4] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Norfolk, VA 23529 USA
[5] Air Force Res Lab, Cyber Assurance Branch, Rome, NY 13441 USA
来源
2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD) | 2017年
基金
中国国家自然科学基金;
关键词
MITC attack; credential protection; isolated execution; attestation; Intel SGX; Trusted Execution Environment;
D O I
10.1109/CLOUD.2017.46
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud environment, client user credential protection is a critical security capability that is target of adversarial attacks, especially, in cloud file synchronization applications. Among the various adversarial attacks, MITC (Man in the Cloud) attack on commercial cloud storage applications has emerged as a critical threat because it is easy to launch and hard to detect. In this paper, we propose MITC Defender, a hardware-based defense system capable of protecting client user credentials using Intel Software Guard Extensions (SGX) and preventing against four different types of MITC attack in cloud environment. By adopting Intel SGX security features such as sealing and attestation, MITC Defender can securely seal user credentials locally and easily unseal user credentials, when verifications are needed, in a Trusted Execution Environment (TEE). We implement MITC Defender on an open source platform OpenSGX and evaluate the performance and potential overhead. Our evaluation results show that MITC Defender is effective on defense against MITC attack and other security threats with a low cost.
引用
收藏
页码:302 / 309
页数:8
相关论文
共 16 条
[1]  
Almeshekah M. H., 2015, P 31 COMPUTER SECURI, P311
[2]  
Anati Ittai, 2013, P 2 INT WORKSH HARDW, V13
[3]  
[Anonymous], 2017, INT S CLUST CLOUD GR
[4]  
[Anonymous], 2015, MAN CLOUD MITC ATT
[5]   Shielding Applications from an Untrusted Cloud with Haven [J].
Baumann, Andrew ;
Peinado, Marcus ;
Hunt, Galen .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2015, 33 (03)
[6]  
Beekman J., 2016, UCBEECS201612
[7]  
Bhargav-Spantzel Abhilasha, 2014, Intel Technology Journal, V18
[8]  
Brickell Ernie, 2011, International Journal of Information Privacy, Security and Integrity, V1, P3
[9]  
George P, 2004, SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, P25
[10]  
Hoekstra M., 2013, HASP@ ISCA, V11, DOI 10.1145/