CloudArmor : Protecting Cloud Instances by Validating Client Commands
نویسندگان
چکیده
IaaS clouds offer on-demand computing resources to clients to offload the burden of IT infrastructure management. However, in order to do so, cloud clients must place full trust in the cloud infrastructure, from various cloud services to the administrators managing the infrastructure. Such trust is often unjustified given the recent evidence of vulnerabilities found in cloud services and threats from accidental and intentional mismanagement by cloud administrators. In this paper, we introduce CloudArmor, a method that validates that client commands are executed as expected on cloud nodes, even if many cloud services are under the control of adversaries. Our insight is that cloud services act as a proxy that transforms commands to sequences of operations performed in cloud. Such transformations, however, do not transform argument values, so we can construct models that limit each command’s execution to legal sequences of system calls and predict their argument values. We implemented a prototype CloudArmor for the OpenStack cloud, converting the compute node to act as a proxy for client to validate how their commands are executed in cloud. Results show that CloudArmor can defend against a variety of attacks from cloud services, enabling a reduction of trust in cloud services by over 90% with no impact on the cloud function. Moreover, as CloudArmor only mediates cloud instance operations, it imposes less than 1.2% overhead for client instances. As a result, OpenStack clients can leverage CloudArmor to manage their instances safely without sacrificing performance or cloud function.
منابع مشابه
A Novel Method for VANET Improvement using Cloud Computing
In this paper, we present a novel algorithm for VANET using cloud computing. We accomplish processing, routing and traffic control in a centralized and parallel way by adding one or more server to the network. Each car or node is considered a Client, in such a manner that routing, traffic control, getting information from client and data processing and storing are performed by one or more serve...
متن کاملMeasuring the Impact of Network Performance on Cloud-Based Speech Recognition An Empirical Study of Apple Siri and Google Speech Recognition
Cloud-based speech recognition systems enhance Web surfing, transportation, health care, etc. For example, using voice commands helps drivers search the Internet without affecting traffic safety risks. User frustration with network traffic problems can affect the usability of these applications. The performance of these type of applications should be robust in difficult network conditions. We e...
متن کاملSecure Deduplication of Encrypted Data without Additional Servers
Encrypting data on the client-side before uploading it to cloud storage is essential for protecting users’ privacy. However client-side encryption is at odds with the standard practice of deduplication in cloud storage services. Reconciling client-side encryption with cross-user deduplication has been an active research topic. In this paper, we present the first secure cross-user deduplication ...
متن کاملWhite Paper∗ Protecting e-Government Against Attacks
E-Government services operate, by definition, across the Internet: citizens use their own desktops or mobile devices to access, via the Internet, government services hosted on servers physically located in some government agency, or even on a private or public cloud. Attacks on e-government can such be broadly divided into three categories: server-side attacks (i.e. on the government servers), ...
متن کاملMeasuring the Impact of Network Performance on Cloud-Based Speech Recognition Applications An Empirical Study of Siri and Google Speech Recognition
Cloud-based speech recognition systems enhance Web surfing, transportation, health care, etc. For example, using voice commands helps drivers search the Internet without affecting traffic safety risks. User frustration with network traffic problems can affect the usability of these applications. The performance of these type of applications should be robust in difficult network conditions. We e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014