Real-time Auditing of the Runtime Environment for Cloud Computing Platforms

被引:1
作者
Hwang, Gwan-Hwan [1 ]
Huang, Kun-Yih [1 ]
Liao, Bo-Siang [1 ]
Yuan, Yi-Ling [1 ]
Chen, Hung-Fu [1 ]
机构
[1] Natl Taiwan Normal Univ, Dept Comp Sci & Informat Engn, Taipei 106, Taiwan
关键词
cloud auditing; runtime-environment auditing; malware; virus; proof-of-violation; SECURITY;
D O I
10.6688/JISE.201903_35(2).0005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we show how to perform efficient auditing of the runtime environment for virtual machines in public cloud systems or standalone computer systems. The goal is to perform real-time integrity checking of executable codes and library files that will be dynamically linked before an application is launched. Auditing these binary files according to their hash values stored in a local machine is deficient because malware or viruses infecting those files can simultaneously alter their corresponding hash values. We propose an effective scheme to perform real-time auditing of such binary files. First, a status code that represents the current status of all executable codes and library files in the runtime environment and comprises only 32 bytes is downloaded from a trusted remote computer. Second, a full binary hash tree is used to perform efficient auditing of files that will be executed and linked by an application according to the downloaded status code. Finally, this application can then be launched safely. We used a real operating system to evaluate the performance of the proposed scheme, and the obtained experimental results demonstrated its feasibility.
引用
收藏
页码:323 / 339
页数:17
相关论文
共 30 条
  • [1] Bayesian based intrusion detection system
    Altwaijry, Hesham
    Algarny, Saeed
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2012, 24 (01) : 1 - 6
  • [2] [Anonymous], 2010, OSDI
  • [3] [Anonymous], TPM main spec.
  • [4] Scalable Attestation: A Step Toward Secure and Trusted Clouds
    Berger, Stefan
    Goldman, Kenneth
    Pendarakis, Dimitrios
    Safford, David
    Valdez, Enriquillo
    Zohar, Mimi
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015), 2015, : 185 - 194
  • [5] DUNN A., 2011, Proceedings of the 29th USENIX Conference on Security, P26
  • [6] Garfinkel T., 2003, Operating Systems Review, V37, P193, DOI 10.1145/1165389.945464
  • [7] Garfinkel T., 2003, P NETW DISTR SYST SE, P1
  • [8] Real-Time Deep Virtual Machine Introspection and Its Applications
    Hizver, Jennia
    Chiueh, Tzi-cker
    [J]. ACM SIGPLAN NOTICES, 2014, 49 (07) : 3 - 14
  • [9] Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection
    Hu, Weiming
    Gao, Jun
    Wang, Yanguo
    Wu, Ou
    Maybank, Stephen
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2014, 44 (01) : 66 - 82
  • [10] Hwang GH, 2016, IEEE INT CONF CLOUD, P132, DOI [10.1109/CLOUD.2016.0027, 10.1109/CLOUD.2016.25]