Skip to main content

2014 | OriginalPaper | Buchkapitel

Federated Cloud Security Architecture for Secure and Agile Clouds

verfasst von : Weiliang Luo, Li Xu, Zhenxin Zhan, Qingji Zheng, Shouhuai Xu

Erschienen in: High Performance Cloud Auditing and Applications

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cyber threats against clouds have evolved rapidly. Traditional reactive cyber defense technologies are not effective and sufficient to protect federated clouds. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set of seamlessly integrated systematic security mechanisms at the application layer, the network layer and the system layer in federated cloud computing environments. Features of the architecture include: (1) it is centered on proactive cyber defense; (2) it facilitates to detect early warning cyber attacks against at one layer and deploy early warning signs of attacks to other layers for countermeasures; (3) it uses command and control (C2) to coordinate both in-cloud and cross-cloud defense activities via federated cloud security centers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Almotairi, S.I., Clark, A.J., Dacier, M., Leita, C., Mohay, G.M., Pham, V.H., Thonnard, O., Zimmermann, J.: Extracting inter-arrival time based behaviour from honeypot traffic using cliques. In: Proceedings of the 5th Australian Digital Forensics Conference, Perth, pp. 79–87 (2007) Almotairi, S.I., Clark, A.J., Dacier, M., Leita, C., Mohay, G.M., Pham, V.H., Thonnard, O., Zimmermann, J.: Extracting inter-arrival time based behaviour from honeypot traffic using cliques. In: Proceedings of the 5th Australian Digital Forensics Conference, Perth, pp. 79–87 (2007)
2.
Zurück zum Zitat Almotairi, S., Clark, A., Mohay, G., Zimmermann, J.: Characterization of attackers’ activities in honeypot traffic using principal component analysis. In: Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing, NPC’08, Shanghai, pp. 147–154. IEEE Computer Society, Washington, DC (2008) Almotairi, S., Clark, A., Mohay, G., Zimmermann, J.: Characterization of attackers’ activities in honeypot traffic using principal component analysis. In: Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing, NPC’08, Shanghai, pp. 147–154. IEEE Computer Society, Washington, DC (2008)
3.
Zurück zum Zitat Almotairi, S., Clark, A., Mohay, G., Zimmermann, J.: A technique for detecting new attacks in low-interaction honeypot traffic. In: Proceedings of the 4th International Conference on Internet Monitoring and Protection, ICIMP’09, Venice, pp. 7–13. IEEE Computer Society, Washington, DC (2009) Almotairi, S., Clark, A., Mohay, G., Zimmermann, J.: A technique for detecting new attacks in low-interaction honeypot traffic. In: Proceedings of the 4th International Conference on Internet Monitoring and Protection, ICIMP’09, Venice, pp. 7–13. IEEE Computer Society, Washington, DC (2009)
4.
Zurück zum Zitat An, K.: Resource management and fault tolerance principles for supporting distributed real-time and embedded systems in the cloud. In: Proceedings of the 9th Middleware Doctoral Symposium of the 13th ACM/IFIP/USENIX International Middleware Conference, MIDDLEWARE’12, Montreal, pp. 4:1–4:6. ACM, New York (2012). doi:10.1145/2405688.2405692 An, K.: Resource management and fault tolerance principles for supporting distributed real-time and embedded systems in the cloud. In: Proceedings of the 9th Middleware Doctoral Symposium of the 13th ACM/IFIP/USENIX International Middleware Conference, MIDDLEWARE’12, Montreal, pp. 4:1–4:6. ACM, New York (2012). doi:10.1145/2405688.2405692
5.
Zurück zum Zitat Anderson, T.E.: weforum.org, Exploring the future of cloud computing: riding the next wave of technology-driven transformation. http://goo.gl/BeR45 (2010) Anderson, T.E.: weforum.org, Exploring the future of cloud computing: riding the next wave of technology-driven transformation. http://​goo.​gl/​BeR45 (2010)
6.
Zurück zum Zitat Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010). doi:10.1145/ 1721654.1721672CrossRef Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010). doi:10.1145/ 1721654.1721672CrossRef
7.
Zurück zum Zitat Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS’07, Alexandria, pp. 598–609. ACM, New York (2007). doi:10.1145/1315245.1315318 Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS’07, Alexandria, pp. 598–609. ACM, New York (2007). doi:10.1145/1315245.1315318
8.
Zurück zum Zitat Azab, A.M., Ning, P., Wang, Z., Jiang, X., Zhang, X., Skalsky, N.C.: Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS’10, Chicago, pp. 38–49. ACM, New York (2010). doi:10.1145/1866307.1866313 Azab, A.M., Ning, P., Wang, Z., Jiang, X., Zhang, X., Skalsky, N.C.: Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS’10, Chicago, pp. 38–49. ACM, New York (2010). doi:10.1145/1866307.1866313
9.
Zurück zum Zitat Azab, A.M., Ning, P., Zhang, X.: Sice: A hardware-level strongly isolated computing environment for x86 multi-core platforms. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS’11, pp. 375–388. ACM, New York (2011). doi:10.1145/2046707. 2046752 Azab, A.M., Ning, P., Zhang, X.: Sice: A hardware-level strongly isolated computing environment for x86 multi-core platforms. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS’11, pp. 375–388. ACM, New York (2011). doi:10.1145/2046707. 2046752
10.
Zurück zum Zitat Benczur, A.A., Csalogany, K., Sarlos, T., Uher, M., Uher, M.: Spamrank – fully automatic link spam detection. In: Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web, AIRWeb’05, Chiba (2005) Benczur, A.A., Csalogany, K., Sarlos, T., Uher, M., Uher, M.: Spamrank – fully automatic link spam detection. In: Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web, AIRWeb’05, Chiba (2005)
11.
Zurück zum Zitat Berger, S., Cáceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vtpm: virtualizing the trusted platform module. In: Proceedings of the 15th Conference on USENIX Security Symposium – Volume 15, USENIX-SS’06, Vancouver. USENIX Association, Berkeley (2006) Berger, S., Cáceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vtpm: virtualizing the trusted platform module. In: Proceedings of the 15th Conference on USENIX Security Symposium – Volume 15, USENIX-SS’06, Vancouver. USENIX Association, Berkeley (2006)
12.
Zurück zum Zitat Canali, D., Cova, M., Vigna, G., Kruegel, C.: Prophiler: a fast filter for the large-scale detection of malicious web pages. In: Proceedings of the 20th International Conference on World Wide Web, WWW’11, pp. 197–206. ACM, New York (2011). doi:10.1145/1963405.1963436 Canali, D., Cova, M., Vigna, G., Kruegel, C.: Prophiler: a fast filter for the large-scale detection of malicious web pages. In: Proceedings of the 20th International Conference on World Wide Web, WWW’11, pp. 197–206. ACM, New York (2011). doi:10.1145/1963405.1963436
13.
Zurück zum Zitat Chellapilla, K., Maykov, A.: A taxonomy of javascript redirection spam. In: Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web, AIRWeb’07, Banff, pp. 81–88. ACM, New York (2007). doi:10.1145/1244408.1244423 Chellapilla, K., Maykov, A.: A taxonomy of javascript redirection spam. In: Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web, AIRWeb’07, Banff, pp. 81–88. ACM, New York (2007). doi:10.1145/1244408.1244423
14.
Zurück zum Zitat Choi, H., Zhu, B.B., Lee, H.: Detecting malicious web links and identifying their attack types. In: Proceedings of the 2nd USENIX Conference on Web Application Development, WebApps’11, Portland, pp. 121–132. USENIX Association, Berkeley (2011) Choi, H., Zhu, B.B., Lee, H.: Detecting malicious web links and identifying their attack types. In: Proceedings of the 2nd USENIX Conference on Web Application Development, WebApps’11, Portland, pp. 121–132. USENIX Association, Berkeley (2011)
15.
Zurück zum Zitat Clark, A., Dacier, M., Mohay, G., Pouget, F., Zimmermann, J.: Internet attack knowledge discovery via clusters and cliques of attack traces. J. Inf. Assur. Secur. 1(1), 21–32 (2006) Clark, A., Dacier, M., Mohay, G., Pouget, F., Zimmermann, J.: Internet attack knowledge discovery via clusters and cliques of attack traces. J. Inf. Assur. Secur. 1(1), 21–32 (2006)
16.
Zurück zum Zitat Conti, G., Abdullah, K.: Passive visual fingerprinting of network attack tools. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC’04, Washington DC, pp. 45–54. ACM, New York (2004). doi:10.1145/1029208.1029216 Conti, G., Abdullah, K.: Passive visual fingerprinting of network attack tools. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC’04, Washington DC, pp. 45–54. ACM, New York (2004). doi:10.1145/1029208.1029216
17.
Zurück zum Zitat Dai, W., Jin, H., Zou, D., Xu, S., Zheng, W., Shi, L.: Tee: A virtual drtm based execution environment for secure cloud-end computing. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS’10, Chicago, pp. 663–665. ACM, New York (2010). doi:10.1145/1866307.1866390 Dai, W., Jin, H., Zou, D., Xu, S., Zheng, W., Shi, L.: Tee: A virtual drtm based execution environment for secure cloud-end computing. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS’10, Chicago, pp. 663–665. ACM, New York (2010). doi:10.1145/1866307.1866390
18.
Zurück zum Zitat Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: Proceedings of the 2007 ACM Workshop on Recurring Malcode, WORM’07, pp. 1–8. ACM, New York (2007). doi:10.1145/1314389.1314391 Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: Proceedings of the 2007 ACM Workshop on Recurring Malcode, WORM’07, pp. 1–8. ACM, New York (2007). doi:10.1145/1314389.1314391
19.
Zurück zum Zitat Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual machine-based platform for trusted computing. ACM SIGOPS Oper. Syst. Rev. 37(5), 193–206 (2003). doi:10.1145/1165389.945464CrossRef Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual machine-based platform for trusted computing. ACM SIGOPS Oper. Syst. Rev. 37(5), 193–206 (2003). doi:10.1145/1165389.945464CrossRef
20.
Zurück zum Zitat Gyongyi, Z., Garcia-Molina, H.: Web spam taxonomy. In: Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web, AIRWeb’05, Chiba (2005) Gyongyi, Z., Garcia-Molina, H.: Web spam taxonomy. In: Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web, AIRWeb’05, Chiba (2005)
21.
Zurück zum Zitat Juels, A., Kaliski, B.S., Jr.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS’07, Alexandria, pp. 584–597. ACM, New York (2007). doi:10.1145/1315245.1315317 Juels, A., Kaliski, B.S., Jr.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS’07, Alexandria, pp. 584–597. ACM, New York (2007). doi:10.1145/1315245.1315317
22.
Zurück zum Zitat Kartaltepe, E.J., Morales, J.A., Xu, S., Sandhu, R.: Social network-based botnet command-and-control: emerging threats and countermeasures. In: Proceedings of the 8th International Conference on Applied Cryptography and Network Security, ACNS’10, Beijing, pp. 511–528. Springer, Berlin/Heidelberg (2010) Kartaltepe, E.J., Morales, J.A., Xu, S., Sandhu, R.: Social network-based botnet command-and-control: emerging threats and countermeasures. In: Proceedings of the 8th International Conference on Applied Cryptography and Network Security, ACNS’10, Beijing, pp. 511–528. Springer, Berlin/Heidelberg (2010)
23.
Zurück zum Zitat Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: sel4: formal verification of an OS kernel. In: Proceedings of the 2009 ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP’09, Big Sky, pp. 207–220. ACM, New York (2009). doi:10.1145/1629575.1629596 Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: sel4: formal verification of an OS kernel. In: Proceedings of the 2009 ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP’09, Big Sky, pp. 207–220. ACM, New York (2009). doi:10.1145/1629575.1629596
24.
Zurück zum Zitat Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, SIGMOD’06, Chicago, pp. 121–132. ACM, New York (2006). doi:10.1145/1142473.1142488 Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, SIGMOD’06, Chicago, pp. 121–132. ACM, New York (2006). doi:10.1145/1142473.1142488
25.
Zurück zum Zitat Li, Z., Goyal, A., Chen, Y., Paxson, V.: Towards situational awareness of large-scale botnet probing events. IEEE Trans. Inf. Forensics Secur. 6(1), 175–188 (2011). doi:10.1109/TIFS.2010.2086445CrossRef Li, Z., Goyal, A., Chen, Y., Paxson, V.: Towards situational awareness of large-scale botnet probing events. IEEE Trans. Inf. Forensics Secur. 6(1), 175–188 (2011). doi:10.1109/TIFS.2010.2086445CrossRef
26.
Zurück zum Zitat Luna Garcia, J., Langenberg, R., Suri, N.: Benchmarking cloud security level agreements using quantitative policy trees. In: Proceedings of the 4th ACM Workshop on Cloud Computing Security Workshop, CCSW’12, Raleigh, pp. 103–112. ACM, New York (2012). doi:10.1145/2381913. 2381932 Luna Garcia, J., Langenberg, R., Suri, N.: Benchmarking cloud security level agreements using quantitative policy trees. In: Proceedings of the 4th ACM Workshop on Cloud Computing Security Workshop, CCSW’12, Raleigh, pp. 103–112. ACM, New York (2012). doi:10.1145/2381913. 2381932
27.
Zurück zum Zitat Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious web sites from suspicious urls. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD’09, Paris, pp. 1245–1254. ACM, New York (2009). doi:10.1145/1557019.1557153 Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious web sites from suspicious urls. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD’09, Paris, pp. 1245–1254. ACM, New York (2009). doi:10.1145/1557019.1557153
28.
Zurück zum Zitat Mahoney, M.V., Chan, P.K.: Learning nonstationary models of normal network traffic for detecting novel attacks. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD’02, Edmonton, pp. 376–385. ACM, New York (2002). doi:10.1145/775047.775102 Mahoney, M.V., Chan, P.K.: Learning nonstationary models of normal network traffic for detecting novel attacks. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD’02, Edmonton, pp. 376–385. ACM, New York (2002). doi:10.1145/775047.775102
29.
Zurück zum Zitat McCune, J.M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: Trustvisor: efficient TCB reduction and attestation. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP’10, Oakland, pp. 143–158. IEEE Computer Society, Washington, DC (2010). doi:10. 1109/SP.2010.17 McCune, J.M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: Trustvisor: efficient TCB reduction and attestation. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP’10, Oakland, pp. 143–158. IEEE Computer Society, Washington, DC (2010). doi:10. 1109/SP.2010.17
32.
Zurück zum Zitat Niu, Y., Chen, H., Hsu, F., Wang, Y.M., Ma, M.: A quantitative study of forum spamming using context-based analysis. In: Proceedings of the 2007 Network and Distributed System Security Symposium, NDSS’07, San Diego (2007) Niu, Y., Chen, H., Hsu, F., Wang, Y.M., Ma, M.: A quantitative study of forum spamming using context-based analysis. In: Proceedings of the 2007 Network and Distributed System Security Symposium, NDSS’07, San Diego (2007)
33.
Zurück zum Zitat Pang, H., Zhang, J., Mouratidis, K.: Scalable verification for outsourced dynamic databases. Proc. VLDB Endow. 2(1), 802–813 (2009) Pang, H., Zhang, J., Mouratidis, K.: Scalable verification for outsourced dynamic databases. Proc. VLDB Endow. 2(1), 802–813 (2009)
34.
Zurück zum Zitat Petroni Jr., N.L., Hicks, M.: Automated detection of persistent kernel control-flow attacks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS’07, Alexandria, pp. 103–115. ACM, New York (2007). doi:10.1145/1315245.1315260 Petroni Jr., N.L., Hicks, M.: Automated detection of persistent kernel control-flow attacks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS’07, Alexandria, pp. 103–115. ACM, New York (2007). doi:10.1145/1315245.1315260
36.
Zurück zum Zitat Pouget, F., Dacier, M.: Honeypot-based forensics. In: Proceedings of the 2004 AusCERT Asia Pacific Information Technology Security Conference, AusCERT’04, Gold Coast (2004) Pouget, F., Dacier, M.: Honeypot-based forensics. In: Proceedings of the 2004 AusCERT Asia Pacific Information Technology Security Conference, AusCERT’04, Gold Coast (2004)
39.
Zurück zum Zitat Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: network processing as a cloud service. In: Proceedings of the 2012 ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM ’12, Helsinki, pp. 13–24. ACM, New York (2012). doi:10.1145/2342356.2342359 Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: network processing as a cloud service. In: Proceedings of the 2012 ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM ’12, Helsinki, pp. 13–24. ACM, New York (2012). doi:10.1145/2342356.2342359
40.
Zurück zum Zitat Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N., Lo Iacono, L.: All your clouds are belong to us: security analysis of cloud management interfaces. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW’11, Chicago, pp. 3–14. ACM, New York (2011). doi:10.1145/2046660.2046664 Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N., Lo Iacono, L.: All your clouds are belong to us: security analysis of cloud management interfaces. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW’11, Chicago, pp. 3–14. ACM, New York (2011). doi:10.1145/2046660.2046664
41.
Zurück zum Zitat Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesly Longman, Boston (2002) Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesly Longman, Boston (2002)
42.
Zurück zum Zitat Steinberg, U., Kauer, B.: Nova: a microhypervisor-based secure virtualization architecture. In: Proceedings of the 5th European Conference on Computer Systems, EuroSys’10, Paris, pp. 209–222. ACM, New York (2010). doi:10.1145/1755913.1755935 Steinberg, U., Kauer, B.: Nova: a microhypervisor-based secure virtualization architecture. In: Proceedings of the 5th European Conference on Computer Systems, EuroSys’10, Paris, pp. 209–222. ACM, New York (2010). doi:10.1145/1755913.1755935
43.
Zurück zum Zitat Stone-Gross, B., Holz, T., Stringhini, G., Vigna, G.: The underground economy of spam: a botmaster’s perspective of coordinating large-scale spam campaigns. In: Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, LEET’11, Boston, pp. 25–32. USENIX Association, Berkeley (2011) Stone-Gross, B., Holz, T., Stringhini, G., Vigna, G.: The underground economy of spam: a botmaster’s perspective of coordinating large-scale spam campaigns. In: Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, LEET’11, Boston, pp. 25–32. USENIX Association, Berkeley (2011)
44.
Zurück zum Zitat Szefer, J., Keller, E., Lee, R.B., Rexford, J.: Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS’11, Chicago, pp. 401–412. ACM, New York (2011). doi:10.1145/2046707. 2046754 Szefer, J., Keller, E., Lee, R.B., Rexford, J.: Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS’11, Chicago, pp. 401–412. ACM, New York (2011). doi:10.1145/2046707. 2046754
45.
Zurück zum Zitat Szefer, J., Lee, R.B.: Architectural support for hypervisor-secure virtualization. In: Proceedings of the 7th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS’12, London, pp. 437–450. ACM, New York (2012). doi:10.1145/2150976.2151022 Szefer, J., Lee, R.B.: Architectural support for hypervisor-secure virtualization. In: Proceedings of the 7th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS’12, London, pp. 437–450. ACM, New York (2012). doi:10.1145/2150976.2151022
46.
Zurück zum Zitat Ta-Min, R., Litty, L., Lie, D.: Splitting interfaces: making trust between applications and operating systems configurable. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI’06, Seattle, pp. 279–292. USENIX Association, Berkeley (2006) Ta-Min, R., Litty, L., Lie, D.: Splitting interfaces: making trust between applications and operating systems configurable. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI’06, Seattle, pp. 279–292. USENIX Association, Berkeley (2006)
47.
Zurück zum Zitat Thonnard, O., Dacier, M.: A framework for attack patterns’ discovery in honeynet data. Digit. Investig. 5, S128–S139 (2008). doi:10.1016/j.diin. 2008.05.012CrossRef Thonnard, O., Dacier, M.: A framework for attack patterns’ discovery in honeynet data. Digit. Investig. 5, S128–S139 (2008). doi:10.1016/j.diin. 2008.05.012CrossRef
49.
Zurück zum Zitat Wang, Y.M., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., King, S.T.: Automated Web patrol with strider HoneyMonkeys: finding Web sites that exploit browser vulnerabilities. In: Proceedings of the 2006 Network and Distributed System Security Symposium, NDSS’06, San Diego. The Internet Society, San Diego (2006) Wang, Y.M., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., King, S.T.: Automated Web patrol with strider HoneyMonkeys: finding Web sites that exploit browser vulnerabilities. In: Proceedings of the 2006 Network and Distributed System Security Symposium, NDSS’06, San Diego. The Internet Society, San Diego (2006)
50.
Zurück zum Zitat Wang, Z., Jiang, X.: Hypersafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP’10, Oakland, pp. 380–395. IEEE Computer Society, Washington, DC (2010). doi:10.1109/SP.2010. 30 Wang, Z., Jiang, X.: Hypersafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP’10, Oakland, pp. 380–395. IEEE Computer Society, Washington, DC (2010). doi:10.1109/SP.2010. 30
51.
Zurück zum Zitat Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Proceedings of the 1st ACM Workshop on Cloud Computing Security, CCSW’09, Chicago, pp. 91–96. ACM, New York (2009). doi:10.1145/1655008.1655021 Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Proceedings of the 1st ACM Workshop on Cloud Computing Security, CCSW’09, Chicago, pp. 91–96. ACM, New York (2009). doi:10.1145/1655008.1655021
52.
Zurück zum Zitat Wu, B., Davison, B.D.: Cloaking and redirection: a preliminary study. In: Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web, AIRWeb’05, Chiba, pp. 7–16. Chiba (2005) Wu, B., Davison, B.D.: Cloaking and redirection: a preliminary study. In: Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web, AIRWeb’05, Chiba, pp. 7–16. Chiba (2005)
53.
Zurück zum Zitat van Doorn, L.: Trusted computing challenges. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, STC’07, Alexandria, pp. 1–1. ACM, New York (2007). doi:10.1145/1314354.1314356 van Doorn, L.: Trusted computing challenges. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, STC’07, Alexandria, pp. 1–1. ACM, New York (2007). doi:10.1145/1314354.1314356
54.
Zurück zum Zitat Xu, S., Yung, M.: Socialclouds: concept, security architecture and some mechanisms. In: Proceedings of the 1st International Conference on Trusted Systems, INTRUST’09, Beijing, pp. 104–128. Springer, Berlin/Heidelberg (2010). doi:10.1007/978-3-642-14597-1_7 Xu, S., Yung, M.: Socialclouds: concept, security architecture and some mechanisms. In: Proceedings of the 1st International Conference on Trusted Systems, INTRUST’09, Beijing, pp. 104–128. Springer, Berlin/Heidelberg (2010). doi:10.​1007/​978-3-642-14597-1_​7
55.
Zurück zum Zitat Zheng, Q., Xu, S.: Fair and dynamic proofs of retrievability. In: Proceedings of the 1st ACM Conference on Data and Application Security and Privacy, CODASPY’11, San Antonio, pp. 237–248. ACM, New York (2011). doi:10.1145/1943513.1943546 Zheng, Q., Xu, S.: Fair and dynamic proofs of retrievability. In: Proceedings of the 1st ACM Conference on Data and Application Security and Privacy, CODASPY’11, San Antonio, pp. 237–248. ACM, New York (2011). doi:10.1145/1943513.1943546
56.
Zurück zum Zitat Zheng, Q., Xu, S., Ateniese, G.: Efficient query integrity for outsourced dynamic databases. In: Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop, CCSW’12, Raleigh, pp. 71–82. ACM, New York (2012). doi:10.1145/2381913.2381927 Zheng, Q., Xu, S., Ateniese, G.: Efficient query integrity for outsourced dynamic databases. In: Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop, CCSW’12, Raleigh, pp. 71–82. ACM, New York (2012). doi:10.1145/2381913.2381927
Metadaten
Titel
Federated Cloud Security Architecture for Secure and Agile Clouds
verfasst von
Weiliang Luo
Li Xu
Zhenxin Zhan
Qingji Zheng
Shouhuai Xu
Copyright-Jahr
2014
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-3296-8_7

Premium Partner