Skip to main content
Erschienen in: Journal of Network and Systems Management 1/2024

01.03.2024

C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services

verfasst von: Mohamed Oulaaffart, Rémi Badonnel, Olivier Festor

Erschienen in: Journal of Network and Systems Management | Ausgabe 1/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The large-scale deployment of cloud composite services distributed over heterogeneous environments poses new challenges in terms of security management. In particular, the migration of their resources is facilitated by recent advances in the area of virtualization techniques. This contributes to increase the dynamics of their configuration, and may induce vulnerabilities that could compromise the security of cloud resources, or even of the whole service. In addition, cloud providers may be reluctant to share precise information regarding the configuration of their infrastructures with cloud tenants that build and deploy cloud composite services. This makes the assessment of vulnerabilities difficult to be performed with only a partial view on the overall configuration. We therefore propose in this article an inter-cloud trusted third-party approach, called C3S-TTP, for supporting secure configurations in cloud composite services, more specifically during the migration of their resources. We describe the considered architecture, its main building blocks and their interactions based on an extended version of the TOSCA orchestration language. The trusted third party is capable to perform a precise and exhaustive vulnerability assessment, without requiring the cloud provider and the cloud tenant to share critical configuration information between each other. After designing and formalizing this third party solution, we perform large series of experiments based on a proof-of-concept prototype in order to quantify its benefits and limits.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Composite Cloud Configuration Security - Trusted Third Party.
 
2
Topology and Orchestration Specification for Cloud Applications.
 
3
Open Vulnerability and Assessment Language.
 
4
Extensible Configuration Checklist Description Format.
 
5
A theorem prover from Microsoft Research. It is licensed under the MIT license.
 
6
Open-source SMT solver. It is proof-producing and complete for quantifier-free formulas with uninterpreted functions and linear arithmetic on real number and integers.
 
7
An international initiative aimed at facilitating research and development in Satisfiability Modulo Theories (SMT).
 
8
Security Configuration Automation Protocol.
 
Literatur
4.
Zurück zum Zitat Pellegrini, R., Rottmann, P., Strieder, G.: IEEE (ed.) Preventing Vendor Lock-ins via an Interoperable Multi-cloud Deployment Approach. (ed.IEEE) Proc. of the 12th International Conference for Internet Technology and Secured Transactions (ICITST), 382–387 (2017) Pellegrini, R., Rottmann, P., Strieder, G.: IEEE (ed.) Preventing Vendor Lock-ins via an Interoperable Multi-cloud Deployment Approach. (ed.IEEE) Proc. of the 12th International Conference for Internet Technology and Secured Transactions (ICITST), 382–387 (2017)
8.
Zurück zum Zitat Gao, X., Gu, Z., Kayaalp, M., Pendarakis, D., Wang, H.: IEEE (ed.) ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds. (ed.IEEE) 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 237–248 (2017) Gao, X., Gu, Z., Kayaalp, M., Pendarakis, D., Wang, H.: IEEE (ed.) ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds. (ed.IEEE) 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 237–248 (2017)
9.
Zurück zum Zitat Oulaaffart, M., Badonnel, R., Bianco, C.: IEEE (ed.) An Automated SMT-based Security Framework for Supporting Migrations in Cloud Composite Services. (ed.IEEE) Proc. of the IEEE Network Operations and Management Symposium (NOMS) (2022) Oulaaffart, M., Badonnel, R., Bianco, C.: IEEE (ed.) An Automated SMT-based Security Framework for Supporting Migrations in Cloud Composite Services. (ed.IEEE) Proc. of the IEEE Network Operations and Management Symposium (NOMS) (2022)
10.
Zurück zum Zitat Martins, J.O., Sahandi, R., Tian, F.: Critical analysis of vendor lock in and its impact on cloud computing migration: a business perspective. J. Cloud Comput. 5, 1–18 (2016) Martins, J.O., Sahandi, R., Tian, F.: Critical analysis of vendor lock in and its impact on cloud computing migration: a business perspective. J. Cloud Comput. 5, 1–18 (2016)
12.
Zurück zum Zitat Ramalingam, C., Mohan, P.: Addressing semantics standards for cloud portability and interoperability in multi cloud environment. Symmetry 13(2), 312 (2021)CrossRef Ramalingam, C., Mohan, P.: Addressing semantics standards for cloud portability and interoperability in multi cloud environment. Symmetry 13(2), 312 (2021)CrossRef
13.
Zurück zum Zitat Celesti, A., Tusa, F., Villari, M., Puliafito, A.: IEEE (ed.) Security and Cloud Computing: InterCloud Identity Management Infrastructure. (ed.IEEE) Proc. of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 263–265 (2010) Celesti, A., Tusa, F., Villari, M., Puliafito, A.: IEEE (ed.) Security and Cloud Computing: InterCloud Identity Management Infrastructure. (ed.IEEE) Proc. of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 263–265 (2010)
14.
Zurück zum Zitat Demchenko, Y., Ngo, C., de Laat, C., Lee, C.: IEEE (ed.) Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns. (ed.IEEE) Proc. of the IEEE International Conference on Cloud Engineering, 439–445 (2014) Demchenko, Y., Ngo, C., de Laat, C., Lee, C.: IEEE (ed.) Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns. (ed.IEEE) Proc. of the IEEE International Conference on Cloud Engineering, 439–445 (2014)
15.
Zurück zum Zitat Demchenko, Y., Turkmen, F., Slawik, M., Laat, C. d.: IEEE (ed.) Defining Intercloud Security Framework and Architecture Components for Multi-cloud Data Intensive Applications. (ed.IEEE) Proc. of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), 945–952 (2017) Demchenko, Y., Turkmen, F., Slawik, M., Laat, C. d.: IEEE (ed.) Defining Intercloud Security Framework and Architecture Components for Multi-cloud Data Intensive Applications. (ed.IEEE) Proc. of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), 945–952 (2017)
18.
Zurück zum Zitat Compastié, M., Badonnel, R., Festor, O., He, R.: IEEE (ed.) A TOSCA-Oriented Software-Defined Security Approach for Unikernel-Based Protected Clouds. (ed.IEEE) Proc. of the IEEE Conference on Network Softwarization (NetSoft), 151–159 (2019) Compastié, M., Badonnel, R., Festor, O., He, R.: IEEE (ed.) A TOSCA-Oriented Software-Defined Security Approach for Unikernel-Based Protected Clouds. (ed.IEEE) Proc. of the IEEE Conference on Network Softwarization (NetSoft), 151–159 (2019)
19.
Zurück zum Zitat Barrere, M., Badonnel, R., Festor, O.: IEEE (ed.) A SAT-based Autonomous Strategy for Security Vulnerability Management. (ed.IEEE) Proc. of the IEEE Network Operations and Management Symposium (NOMS) (2014) Barrere, M., Badonnel, R., Festor, O.: IEEE (ed.) A SAT-based Autonomous Strategy for Security Vulnerability Management. (ed.IEEE) Proc. of the IEEE Network Operations and Management Symposium (NOMS) (2014)
20.
Zurück zum Zitat Anisetti, M., Ardagna, C. A., Damiani, E.: IEEE (ed.) Security Certification of Composite Services: A Test-Based Approach. (ed.IEEE) Proc. of the IEEE International Conference on Web Services (ICWS) (2013) Anisetti, M., Ardagna, C. A., Damiani, E.: IEEE (ed.) Security Certification of Composite Services: A Test-Based Approach. (ed.IEEE) Proc. of the IEEE International Conference on Web Services (ICWS) (2013)
21.
Zurück zum Zitat Anisetti, M., Ardagna, C., Damiani, E., Gaudenzi, F.: A semi-automatic and trustworthy scheme for continuous cloud service certification. IEEE Trans. Serv. Comput. 13, 30–43 (2017)CrossRef Anisetti, M., Ardagna, C., Damiani, E., Gaudenzi, F.: A semi-automatic and trustworthy scheme for continuous cloud service certification. IEEE Trans. Serv. Comput. 13, 30–43 (2017)CrossRef
22.
Zurück zum Zitat Ismail, U. M., Islam, S., Mouratidis, H.: IEEE (ed.) Cloud Security Audit for Migration and Continuous Monitoring. (ed.IEEE) Proc. of the the IEEE Trustcom Conference, Vol. 1 (2015) Ismail, U. M., Islam, S., Mouratidis, H.: IEEE (ed.) Cloud Security Audit for Migration and Continuous Monitoring. (ed.IEEE) Proc. of the the IEEE Trustcom Conference, Vol. 1 (2015)
23.
Zurück zum Zitat Ullah, K. W., Ahmed, A. S. & Ylitalo, J. IEEE (ed.) Towards Building an Automated Security Compliance Tool for the Cloud. (ed.IEEE) Proc. of the IEEE TrustCom Conference, 1587–1593 (2013) Ullah, K. W., Ahmed, A. S. & Ylitalo, J. IEEE (ed.) Towards Building an Automated Security Compliance Tool for the Cloud. (ed.IEEE) Proc. of the IEEE TrustCom Conference, 1587–1593 (2013)
25.
Zurück zum Zitat Celesti, A., Salici, A., Villari, M., Puliafito, A.: IEEE (ed.) A remote attestation approach for a secure virtual machine migration in federated cloud environments. (ed.IEEE) Proc. of the First International Symposium on Network Cloud Computing and Applications, 99–106 (2011) Celesti, A., Salici, A., Villari, M., Puliafito, A.: IEEE (ed.) A remote attestation approach for a secure virtual machine migration in federated cloud environments. (ed.IEEE) Proc. of the First International Symposium on Network Cloud Computing and Applications, 99–106 (2011)
26.
Zurück zum Zitat Aslam, M., Gehrmann, C., Björkman, M.: IEEE (ed.) Security and Trust Preserving VM Migrations in Public Clouds. (ed.IEEE) Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 869–876 (2012) Aslam, M., Gehrmann, C., Björkman, M.: IEEE (ed.) Security and Trust Preserving VM Migrations in Public Clouds. (ed.IEEE) Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 869–876 (2012)
27.
Zurück zum Zitat Oulaaffart, M., Badonnel, R., Festor, O.: IEEE (ed.) Towards Automating Security Enhancement for Cloud Services. (ed.IEEE) Proc. of the International Symposium on Integrated Network Management (IM) (2021) Oulaaffart, M., Badonnel, R., Festor, O.: IEEE (ed.) Towards Automating Security Enhancement for Cloud Services. (ed.IEEE) Proc. of the International Symposium on Integrated Network Management (IM) (2021)
28.
Zurück zum Zitat Herrmann, D.S.: Using the Common Criteria for It Security Evaluation. CRC Press Inc, USA (2002)CrossRef Herrmann, D.S.: Using the Common Criteria for It Security Evaluation. CRC Press Inc, USA (2002)CrossRef
29.
Zurück zum Zitat Schnepf, N., Badonnel, R., Lahmadi, A., Merz, S.: IEEE (ed.) Automated Verification of Security Chains in SDN Networks with Synaptic. (ed.IEEE) Proc. of the Conference on Network Softwarization (NetSoft) (2017) Schnepf, N., Badonnel, R., Lahmadi, A., Merz, S.: IEEE (ed.) Automated Verification of Security Chains in SDN Networks with Synaptic. (ed.IEEE) Proc. of the Conference on Network Softwarization (NetSoft) (2017)
30.
Zurück zum Zitat Gupta, B., Mittal, P., Mufti, T.: IEEE (ed.) A Review on Amazon Web Service (AWS), Microsoft Azure and Google Cloud Platform (GCP) Services. (ed.IEEE) (EAI, 2021) Gupta, B., Mittal, P., Mufti, T.: IEEE (ed.) A Review on Amazon Web Service (AWS), Microsoft Azure and Google Cloud Platform (GCP) Services. (ed.IEEE) (EAI, 2021)
31.
Zurück zum Zitat Neto, M. Z.: et al. Security Troubleshooting on AWS, 339–362 (IEEE, 2021) Neto, M. Z.: et al. Security Troubleshooting on AWS, 339–362 (IEEE, 2021)
36.
Zurück zum Zitat CloudFormation, A.: AWS CloudFormation API Reference (2020) CloudFormation, A.: AWS CloudFormation API Reference (2020)
37.
Zurück zum Zitat Esposito, A., Di Martino, B., Cretella, G.: IEEE (ed.) Defining Cloud Services Workflow: a Comparison between TOSCA and OpenStack Hot. (ed.IEEE) (2015) Esposito, A., Di Martino, B., Cretella, G.: IEEE (ed.) Defining Cloud Services Workflow: a Comparison between TOSCA and OpenStack Hot. (ed.IEEE) (2015)
40.
Zurück zum Zitat Scarfone, K., Mell, P.: IEEE (ed.) An Analysis of CVSS version 2 Vulnerability Scoring. (ed.IEEE) 2009 3rd International Symposium on Empirical Software Engineering and Measurement, 516–525 (2009) Scarfone, K., Mell, P.: IEEE (ed.) An Analysis of CVSS version 2 Vulnerability Scoring. (ed.IEEE) 2009 3rd International Symposium on Empirical Software Engineering and Measurement, 516–525 (2009)
41.
Zurück zum Zitat Wagner, C., Dulaunoy, A., Wagener, G., Iklody, A.: IEEE (ed.) MISP: The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform. (ed.IEEE) Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 49–56 (ACM, 2016) Wagner, C., Dulaunoy, A., Wagener, G., Iklody, A.: IEEE (ed.) MISP: The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform. (ed.IEEE) Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 49–56 (ACM, 2016)
Metadaten
Titel
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services
verfasst von
Mohamed Oulaaffart
Rémi Badonnel
Olivier Festor
Publikationsdatum
01.03.2024
Verlag
Springer US
Erschienen in
Journal of Network and Systems Management / Ausgabe 1/2024
Print ISSN: 1064-7570
Elektronische ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-023-09792-7

Weitere Artikel der Ausgabe 1/2024

Journal of Network and Systems Management 1/2024 Zur Ausgabe

Premium Partner