Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack

被引:21
作者
Madi, Taous [1 ]
Majumdar, Suryadipta [1 ]
Wang, Yushun [1 ]
Jarraya, Yosr [2 ]
Pourzandi, Makan [2 ]
Wang, Lingyu [1 ]
机构
[1] Concordia Univ, CIISE, Montreal, PQ, Canada
[2] Ericsson Canada, Ericsson Secur Res, Montreal, PQ, Canada
来源
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY | 2016年
关键词
Cloud; Virtualization; OpenStack; Security Auditing; Formal Verification; Co-residence; Isolation;
D O I
10.1145/2857705.2857721
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud service providers typically adopt the multi-tenancy model to optimize resources usage and achieve the promised cost-effectiveness. Sharing resources between different tenants and the underlying complex technology increase the necessity of transparency and accountability. In this regard, auditing security compliance of the provider's infrastructure against standards, regulations and customers' policies takes on an increasing importance in the cloud to boost the trust between the stakeholders. However, virtualization and scalability make compliance verification challenging. In this work, we propose an automated framework that allows auditing the cloud infrastructure from the structural point of view while focusing on virtualization-related security properties and consistency between multiple control layers. Furthermore, to show the feasibility of our approach, we integrate our auditing system into OpenStack, one of the most used cloud infrastructure management systems. To show the scalability and validity of our framework, we present our experimental results on assessing several properties related to auditing inter-layer consistency, virtual machines co-residence, and virtual resources isolation.
引用
收藏
页码:195 / 206
页数:12
相关论文
共 32 条
  • [1] [Anonymous], 1997, TECHNICAL REPORT
  • [2] [Anonymous], 2011, Security guidance for critical areas of focus in cloud computing v3. 0
  • [3] [Anonymous], THESIS
  • [4] [Anonymous], 2015, OPENSTACK OP SOURC C
  • [5] [Anonymous], 2013, CLOUD SECUR ALLIANCE
  • [6] [Anonymous], 2012, 27017 ISO IEC
  • [7] Ben-Ari Mordechai, 2012, Mathematical logic for computer science
  • [8] Bleikertz S., 2014, ACM Computer Security Applications Conference, P26
  • [9] Bleikertz S, 2011, PROCEEDINGS OF THE 3RD ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'11), P47
  • [10] Butt S., 2012, SER CCS 12, P253