End-to-end security architecture for cloud computing environments. (Architecture de sécurité de bout en bout et mécanismes d'autoprotection pour les environnements Cloud)

نویسنده

  • Aurélien Wailly
چکیده

Since several years the virtualization of infrastructures became one of the major research challenges. These new virtual machines consume less energy while delivering new services: live migration, consolidation and isolation between tenants. However, many attacks hinder the global adoption of Cloud computing. VESPA Self-protection has recently raised growing interest as possible element of answer to the cloud computing infrastructure protection challenge. Faced with multiple threats and heterogeneous defense mechanisms, the autonomic approach proposes simpler, stronger, and more efficient cloud security management. Yet, previous solutions fall at the last hurdle as they overlook key features of the cloud, by lack of flexible security policies, cross-layered defense, multiple control granularities, and open security architectures. This thesis presents VESPA, a self-protection architecture for cloud infrastructures overcoming such limitations. VESPA is policy-based, and enforces security at two levels, both within and across infrastructure layers. Flexible coordination between self-protection loops allows enforcing a rich spectrum of security strategies such as cross-layer detection and reaction. A multi-plane extensible architecture also enables simple integration of commodity detection and reaction components. Evaluation of a VESPA implementation shows that the design is applicable for effective and flexible self-protection of cloud infrastructures. KungFuVisor Recently, some of the most powerful attacks against cloud computing infrastructures target their very foundation: the hypervisor or Virtual Machine Monitor (VMM). In many cases, the main attack vector is a poorly confined device driver in the virtualization layer, enabling to bypass resource isolation and take complete infrastructure control. Current architectures offer no protection against such attacks. At best, they attempt to contain but do not eradicate the detected threat, usually with static, hard-to-manage defense strategies. This thesis proposes an altogether different approach by presenting KungFuVisor, derived from VESPA. It is a framework to build self-defending hypervisors. The framework regulates hypervisor protection through several coordinated autonomic security loops which supervise different VMM layers through well-defined hooks. Thus, interactions between a device driver and its VMM environment may be strictly monitored and controlled automatically. The result is a very flexible self-protection architecture, enabling to enforce dynamically a rich spectrum of remediation actions over different parts of the VMM, also facilitating defense strategy administration. Conclusion VESPA is a generic, flexible and open architecture enhancing virtualized systems security. We showed the application to three different protection scheme: virus infection, mobile clouds and hypervisor drivers. Through the analysis and the evaluation of the architecture, we showed that cloud infrastructure security can be enhanced.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Autonomie, sécurité et QoS de bout en bout dans un environnement de Cloud Computing. (Security, QoS and self-management within an end-to-end Cloud Computing environment)

Today, Cloud Networking is one of the recent research areas within the Cloud Computing research communities. The main challenges of Cloud Networking concern Quality of Service (QoS) and security guarantee as well as its management in conformance with a corresponding Service Level Agreement (SLA). In this thesis, we propose a framework for resource allocation according to an end-to-end SLA estab...

متن کامل

Mécanismes de handover pour les réseaux IP sans fil

RÉSUMÉ . Le handover est le processus qui permet, à un terminal mobile, d’effectuer le passage entre deux points d’attachement à un réseau. Ce changement de point d’attachement implique une déconnexion momentanée du terminal mobile, et des perturbations des communications en cours. Ainsi, pour disposer d’une communication de qualité avec un terminal mobile, le handover doit introduire des mécan...

متن کامل

Study and Development of a Symmetric protocol to secure communications in WSN

Résumé : Durant cette dernière décennie, les réseaux de capteurs sans fil (RCSF) ont attiré l’attention des chercheurs et des services de recherche et développement en raison de leur facilité de déploiement et de leur champs d’application dans divers domaines, y compris la sécurité et la surveillance, le contrôle, la maintenance des systèmes complexes, l’agriculture, e-santé, etc. Toutefois, en...

متن کامل

RTXP : A Localized Real-Time Mac-Routing Protocol for Wireless Sensor Networks

Protocols developed during the last years for Wireless Sensor Networks (WSNs) are mainly focused on energy efficiency and autonomous mechanisms (e.g. self-organization, selfconfiguration, etc). Nevertheless, with new WSN applications, appear new QoS requirements such as time constraints. Real-time applications require the packets to be delivered before a known time bound which depends on the ap...

متن کامل

Modélisation et Gestion de la Confiance dans les Réseaux Mobiles Ad hoc

Résumé : Les réseaux mobiles Ad hoc annoncent les réseaux de communication du futur où la mobilité en est l’idée maîtresse. Ces réseaux devront être capable d’interconnecter des mobiles, à la volée et de bout en bout, pour leur fournir des services de manière omniprésente. Ils sont de ce fait plus vulnérables à de nombreux types d’attaques. Leur succès dépendra sans aucun doute de la confiance ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014