Secure Logical Isolation for Multi-tenancy in Cloud Storage
|
|
|
- Matthew Norman
- 10 years ago
- Views:
Transcription
1 Secure Logical Isolation for Multi-tenancy in Cloud Storage Michael Factor, David Hadas, Aner Hamama, Nadav Har el, Elliot K. Kolodner, Anil Kurmus, Alexandra Shulman-Peleg, Alessandro Sorniotti IBM Haifa Research Lab IBM Zurich Research Lab Abstract Storage cloud systems achieve economies of scale by serving multiple tenants from a shared pool of servers and disks. This leads to the commingling of data from different tenants on the same devices. Typically, a request is processed by an application running with sufficient privileges to access any tenant s data; this application authenticates the user and authorizes the request prior to carrying it out. Since the only protection is at the application level, a single vulnerability threatens the data of all tenants, and could lead to cross-tenant data leakage, making the cloud much less secure than dedicated physical resources. To provide security close to physical isolation while allowing complete resource pooling, we propose Secure Logical Isolation for Multi-tenancy (SLIM). SLIM incorporates the first complete security model and set of principles for the safe logical isolation between tenant resources in a cloud storage system, as well as a set of mechanisms for implementing the model. We show how to implement SLIM for OpenStack Swift and present initial performance results. 1 INTRODUCTION Cloud systems achieve economies of scale by serving multiple customers from a shared pool of resources [1], [2]; each customer (which could be a company or enterprise) is a tenant of the cloud infrastructure. Physical resource pooling enables load balancing, homogeneity for management and much higher utilization rates. Sharing of physical resources is important for compute clouds as well as storage-centric clouds. In storagecentric clouds, the pooled resources include the physical media and the servers controlling the media. In a cloud where all physical resources are pooled, any given device may have data from multiple, unrelated tenants. A major concern expressed by many businesses over moving to a public cloud delivery model is security [3]. This concern stems from the commingling of the data of different tenants on shared physical resources. It is common for cloud storage systems to provide application-level security, in which components that authenticate and process user requests run with sufficient privileges to access any tenant s data; the code of each component is responsible for authorizing requests based on the requester s credentials. This architecture is used by OpenStack Swift [4] and other publicly available cloud storage systems. Application-level security only provides a single level of defense; a vulnerability that allows bypassing the security check, such as a confused deputy attack [5], can compromise all data stored in the cloud. This is very weak isolation. If each The research leading to these results is partially supported by the European Community s Seventh Framework Programme (FP7/ ) under grant agreement n VISION Cloud Project /13/$ IEEE tenant had its own segregated physical resources, it would be much less likely that a single vulnerability could jeopardize all tenants data. To provide security similar to physical isolation while allowing complete pooling of resources, we propose Secure Logical Isolation for Multi-tenancy (SLIM). SLIM adds an orthogonal tenant isolation mechanism over existing application-level security by leveraging the Linux process isolation mechanisms that have been thoroughly tested for over 20 years by the Linux community and enhanced with mechanisms such as SELinux. SLIM therefore enables resource pooling while decreasing the likelihood that a single vulnerability could jeopardize all tenants data. In particular, SLIM provides this additional isolation across tenants by following the principle of least privilege [6]: each system component runs with the least set of privileges required to complete its task. Moreover, such privileges are designed to be tenant-specific: for example, we define separate privilege classes to access authentication material of tenant A and tenant B. As a consequence, whenever possible, SLIM contains breaches within a tenant by leveraging process isolation. For the remaining components, which need to be trusted to operate on data of multiple tenants, we minimize their attack surface. Employing these principles in an efficient manner is difficult. First, each request must be correctly associated with a tenant and properly split into appropriate sub-pieces each of which is processed under the principle of least privilege [7]. For instance, we use different privileges for authenticating a user and for accessing a disk. Second, we need to address security as we move between components in the cloud implementation, either between different processes implementing different parts of the function on a single server or communicating with a different server, e.g., for data replication. In both cases we need to correctly track the tenant identity and use the appropriate privilege. Finally, in real world systems we may need to use existing resources like a distributed cache (e.g., memcached [8]) or a shared data store (e.g., Cassandra [9]) that do not implement all of our principles. While we cannot provide the same degree of isolation here as we provide in the rest of the system, we still want to maximize the degree of secure logical isolation between data of different tenants. SLIM addresses these issues using the following mechanisms: a security gateway ensures a request is handled with the right tenant-specific privilege
2 a proxy/guard mechanism prevents escalation of privileges as we move between components and a gatekeeper provides a secure wrapper for existing resources These SLIM components are relevant for almost any cloud based object store system, and can be easily integrated to provide end-to-end isolation between tenants. Here, we describe an implementation of SLIM for OpenStack Swift; we are also implementing it for the VISION Cloud project [10]. Our paper makes the following contributions: We present the first complete security model and set of principles for safe logical isolation between tenant resources in a cloud storage system. We define a set of mechanisms for implementing secure, logically isolated cloud storage systems. We implement SLIM for Swift and present initial performance results, determining that process recycling is the most critical factor influencing performance. The next section describes various approaches to security isolation for multi-tenancy and provides background on Swift. Section 3 presents SLIM and its implementation in Swift. Section 4 presents initial performance results. Section 5 presents an informal analysis of SLIM s security. Section 6 presents our conclusions. 2 PROBLEM STATEMENT Cloud storage systems come in multiple flavors that differ in their abstraction, ranging from block storage systems, to key-value and object stores; in this work, we select object stores as our case-study. Although the internal architecture of such services is rarely disclosed, we can identify a number of common features. First, services run over commodity hardware. Second, they are symmetric and decentralized: there is no hierarchy among the pool of machines that provide the service, and such machines run essentially the same code. More significantly in our context, these systems commingle data from different users on the same physical resources. This approach is often referred to as multi-tenancy. Ideally a multi-tenant cloud storage system serves requests of multiple customers (tenants) in such a way that (1) computing and storage resources are shared among such customers and (2) this sharing of resources does not weaken system security. In practice, multi-tenancy is a trade-off between security and costs: the wider the subset of resources shared (e.g., same physical machine vs. same OS), the more the cloud system can amortize costs and increase utilization. However, this sharing leads to weaker isolation and consequently higher security risks. In a typical object store architecture a client contacts a web front-end to issue a request. The front-end passes the request to a request processor, which accesses (e.g., read or write) the data usually through a file system on disks. The request processor may also access a supplementary data store, such as a distributed key/value store. It also performs securityrelated tasks like authentication, authorization and access control enforcement. Usually, the front end authenticates and authorizes a request, prior to executing the request under a single cross-tenant privilege. As a concrete example for our analysis we consider Swift, the popular open-source, cloud object store, which is part of the Openstack Framework. Swift has a two tier architecture, consisting of client facing proxy servers, which handle authentication, authorization and access control enforcement, and storage servers which store objects and manage the associated metadata. A typical installation will consist of multiple proxy and storage servers possibly sharing the same hardware. Each Swift server (proxy or storage) is coupled with an integrated HTTP server, employing WSGI and serving REST requests via a dedicated port. A client request may be addressed to any of the proxy servers, which forwards it to the appropriate storage server(s). Swift, like most other cloud storage systems, employs application-level isolation to address multi-tenancy and the entire service runs with a single privilege level, allowing access to all tenant and user data from the Swift code. Swift enforces isolation through pluggable access control modules such as Keystone or tempauth. Swift supports container ACLs, which are retrieved from a storage server and then cached by the proxy using memcached [8], allowing their fast retrieval. While this approach makes Swift lightweight and able to serve a large number of tenants, it has the negative impact that finding and exploiting a single vulnerability gives an attacker the ability to access resources belonging to any user of any tenant. Furthermore, it is hard to prevent attacks on a given Swift component, since it commingles information for different tenants, including the use of memcached to store sensitive access control data. 3 SECURE LOGICAL ISOLATION FOR MULTI-TENANCY SLIM addresses the weaknesses highlighted in the previous Section, incorporating a security model and set of principles for the safe logical isolation between tenant resources for a cloud storage system, as well as a set of mechanisms for implementing the model. 3.1 System model SLIM provides services for a number of entities that we call users. Users board the system through an enrollment process that equips them with credentials, which can be later on produced to gain access to the system and its resources. Users are grouped into administrative entities called tenants. In what follows we only capture simple hierarchies where there is a set of users, a set of tenants and each user is associated to a single tenant; however, SLIM can be generalized to more complex n-level hierarchies involving sub-tenants. Users interact with a set of service nodes that can serve requests of any user belonging to any tenant; in particular, we do not require dedicated hardware for each tenant, which would undoubtedly achieve comparable, if not better, security guarantees at a much higher total system cost. Service nodes
3 run a commodity operating system and do not require virtualization techniques. Each service node may use local storage and/or shared storage to host user data/metadata. 3.2 Security model We consider two classes of attackers. In both cases, the attacker is a system user, i.e., the attacker owns a valid credential to access the system. Class 1 attackers attempt to access resources belonging to another user of the same tenant, whereas class 2 attackers attempt to access resources belonging to the user of another tenant. We do not assume dedicated hardware or dedicated virtual machines for given users/tenants; however, we do trust the underlying hardware, as well as the multi-user operating systems to provide secure isolation between processes of different OS users; in the rest of the paper, we will use uid to refer to an OS user. This requirement translates into the assumption that the process of one uid cannot access resources (e.g., memory, files, sockets) belonging to another uid. If a process is compromised by an attacker, we assume the attacker can run arbitrary code under the uid that started the process. The assumption above does not take into account the fact that some of the tasks that the service nodes need to perform require higher privileges than those of a single uid, e.g., admin privileges to create processes restricted to a particular uid. A process with such privileges, is called a privileged process and is by definition capable of accessing any resource in the system and can therefore bypass the uid restrictions. As a consequence, if an attacker can compromise a privileged process, it can achieve the objectives of both attacker classes. Finally, nodes partake in a number of internal protocols, through which a node can trigger the execution of a function on another node on the system (e.g., trigger the replication of a file from one node onto another one). We therefore need to ensure that a successful attack which by the assumptions mentioned above should be confined to the privileges of the owner uid only cannot trigger the execution of a function with higher privileges on another node. 3.3 Design Principles The design of our solution was guided by the following four principles. (1) Least privilege requires that every subcomponent operate using the least set of privileges required for its task. A consequence of this principle is the need to use separate processes with different uids for handling the various stages of a user request. (2) Tenant containment requires security isolation of tenant-related resources, i.e., each tenant has its own privileges and hence its own uids. Thus, there is the need to use different processes for each tenant. (3) Escalation avoidance ensures that during the lifetime of a process it will never gain a different, potentially higher privilege. This implies that if a process with a tenant s UID has been used to serve one tenant s requests, it cannot be reused later to process another tenant s request. (4) Minimizing the attack surface keeps the code of any privileged processes simple, small and easy to audit. Fig. 1. The architectural components of SLIM (dark gray) added to a typical object store architecture (light gray). 3.4 Design and Implementation Complying with the principles described above requires introducing end-to-end tenant isolation in the cloud storage system, where we isolate both the processing and the access to all tenant related information stored on the disks and in supplementary data stores. The architectural elements of SLIM are illustrated in Figure 1. They include the following privileged processes: (1) a Security Gateway, which splits the execution of a request into subtasks running under the proper uids with confined privileges; (2) a Gatekeeper, which protects the access to shared resources without built-in access control, e.g., a key-value store; and (3) Guard and Proxy components to maintain tenant identity and privileges across processes running on the same or different nodes. The remaining processes are tenant-specific: (4) a Tenant Authenticator to authenticate the tenant named in a request; and (5) a Request Processor to execute the request. Below we detail the design of these components as well as their implementation over Swift. Security Gateway: A user request first arrives at the web front end, which delivers it to a security gateway. The security gateway introduces privilege separation by splitting the execution of a request into subtasks, executing each subtask under a dedicated uid corresponding to the required privilege of the specific tenant. It begins by sanitizing the request and verifying the validity of its parameters. It extracts the authentication credentials from the request, e.g., from the HTTP headers, and passes them to a tenant authenticator process, which authenticates the tenant claimed in the request. Upon approval from the authenticator, the security gateway delivers the request to an appropriate request processor that has the privilege of the tenant. To prevent an attacker from tampering with requests, SLIM requires that requests be protected, e.g., signed, so the first action of the request processor is to authenticate the request. Mechansims for protecting requests are outside of the scope of SLIM. Gatekeeper for shared resource protection: In some cases a request processor may need to access a shared resource. This can be a distributed data store, like Cassandra [9], e.g., used as a metadata catalog by the VISION Cloud, or a
4 shared cache like memcached [8], e.g., used by Swift, which do not have built-in, fine-grained access control mechanisms, yet are used to store data of multiple tenants. Despite the potential security threats they can not always be replaced by traditional data stores like RDBS, that provide access control, yet may limit performance and scalability. Each such resource has its own gatekeeper process. For each request, the gatekeeper verifies the true tenant identity of the process requesting access to the resource. Once the gatekeeper has uniquely identified the tenant, its goal is to protect the corresponding resource (e.g., keys and values) in a way that it will be inaccessible to other tenants. To isolate the keys under which the data is stored, the gatekeeper labels them with a unique tenant identifier. When integrity and confidentiality are also important, this key may be cryptographically signed or encrypted with a unique key belonging to the tenant. The values stored under these keys should also be signed or encrypted according to the selected level of protection. To prevent any backdoor attacks, all data store access requests that do not originate from the gatekeeper are blocked (e.g., by protecting the socket with ACLs). This allows the gatekeeper to isolate views of the shared resource that each tenant has, ensuring that each tenant has access only to its own keys and values. This prevents cross-tenant data leakage and malicious modifications of the stored keys and values. Guard and Proxy to protect inter-node communication: In some cases a request processor (a first process) may need to assign a task to a second process, possibly on another node. This is done through a guard and a proxy that ensure the identity of the tenant is maintained when the task is executed by the second process. The request to the second process must go through a proxy. Furthermore, the second process may execute the task only if requested by a guard. Guards and proxies maintain a trusted communication channel (e.g., using a VPN or privileged ports in a well controlled environment). These restrictions are applied by using operating system access control and firewall rules. SLIM maintains the tenant identity and privilege between the request processor and the second process using the following three stages: (1) The proxy, which runs on the same node as the first process, extracts the true set of privileges of the first process (e.g., by using OS-level primitives such as SCM CREDENTIALS). (2) The proxy sends a description of the privileges together with the request of the first process to the guard, which resides on the same node as the second process. (3) The guard delivers the request to the second process that has the appropriate set of privileges. 4 PERFORMANCE ANALYSIS We conducted performance tests which evaluated the penalty of adding SLIM to an object storage system of Swift. We compared throughput for PUT and GET requests of objects of various size (on a 8-core, 2.33GHz, x86 server with 16GB RAM, having Swift s SAIO configuration with 9 disks divided into 3 zones). For each combination of operation and object size, we ran swift-bench for five minutes. To select the best configuration in which the resources are maximally utilized, we monitored the CPU and disk utilization. We observed that swift-bench with request concurrency of 15 gave almost 100% CPU utilization for SLIM, while for vanilla Swift, it was maximized at a concurrency of 150. Not surprisingly, vanilla Swift has the highest performance, which was especially noticeable for small objects. For example, for 16KB objects it supports the throughput of 4.8 and 16.8 MB/s for PUT and GET operations respectively. However, vanilla Swift recycles processes between tenants which can lead to cross-tenant leakage. We observed that using the apache server with CGI for creating a fresh process for executing each tenant request leads to severe performance degradation, supporting the throughput of only 0.08 and 0.3 MB/s for PUT and GET of 16K objects respectively. Thus, we conclude that process recycling is the most critical factor influencing the performance and we are working on its optimization. The Security Gateway and the Gatekeeper were not observed to influence performance and can be safely added to achieve multi-tenant isolation. Interestingly, when the object size was increased the differences between the systems became less noticeable as both vanilla Swift and SLIM saturated the network, which became the major bottleneck. 5 SECURITY ANALYSIS The security model presented in this work considers two types of attacks: attacks within a tenant (class 1) and crosstenant (class 2). Possible attacks can target vulnerabilities in the web front end, request processor, and privileged components such as the kernel, data stores lacking authorization mechanism, security gateway, proxy and guard, and gatekeeper. The attacks we consider here range from confused deputy attacks to full compromise of a process with arbitrary code execution. The attackers goal is either to access another user s data from the same tenant (class 1) or other tenant data (class 2). In this section we show that SLIM protects against class 2 attacks and decreases the likelihood that a single vulnerability could jeopardize all tenants data. Figure 2 illustrates the defense line added by SLIM to achieve this goal as we detail below. An imminent risk to the system could come from a potential vulnerability in the web front end or the request processor as these components are both directly exposed to an attacker and are large software packages, such as Apache and Swift. To duly protect tenant data, we assume such vulnerabilities exist and either the web front end and/or the request processor could be fully compromised. SLIM ensures that even under such a compromise, tenant data remains secure by: (1) restricting a request processor, which is privileged to access tenant-data, to a tenant-specific UID by the security gateway as well as the proxy/guard components when inter-node communication is involved; (2) restricting a tenant-specific authenticator to a tenant-specific UID; and (3) restricting access to data stores lacking authorization mechanisms through the gatekeeper.
5 LOC) makes them easy to audit, making such attacks unlikely. Fig. 2. The defense line added by SLIM protects tenants using Swift from unauthorized access to their data when the Swift request processor and/or web front end is compromised. Below, we detail the attacks SLIM protects against by examining the cases where various components are either compromised and used as a stepping stone for attacking further modules, or are under a confused deputy attack. Web front end: A compromised web front end cannot access any tenant data directly since it is not privileged to access the data stores. However given that TLS termination occurs within this component, an attacker could mount a manin-the-middle attack against any tenant, potentially accessing that tenant s data. Yet, the attack is limited in time (the attacker can only intercept requests occurring within the timeframe of the compromise). Additionally, the system may authenticate the requests (e.g., using signatures) and test for authenticity at the request processor; in this way the attacker can be prevented from tampering with the requests. Request processor: In case a request processor is compromised, the attacker s process can only access the corresponding tenant-data, and is limited to performing tenant-specific queries through the security gateway and proxy. This does not prevent the attacker from accessing data from another user of the same tenant, but confines the attack within the tenant. Data stores lacking authorization mechanism: In case the data store is compromised, the attacker could mount attacks that will lead to the compromise of all tenants data. However, because the interface to the data store is highly restricted by the gatekeeper, which only exposes a simple interface, such an event is less likely. Kernel: If local access is obtained, this could put the attacker in a better position to perform further attacks to elevate his privileges. In particular, the Linux kernel exposes a very large attack surface to local attackers [11], [12]. Although this is out of the scope of our work, this attack surface can be greatly reduced (see for example [13], [14], [15], [11]). We note that the request processor and authenticators do not have network access (this is enforced by the use of the proxy as well as host-firewall rules), hence preventing network-based attacks being used for privilege elevation. Security gateway, the gatekeeper, or the proxy/guard: Similarly, the attacker could target one of the remaining privileged processes: the security gateway, the gatekeeper, or the proxy/guard. However, their very small size (less than CONCLUSION We presented SLIM, an end-to-end approach to tenant isolation in a multi-tenant cloud storage system that allows all resources to be shared. SLIM shows how to adapt a cloud storage architecture to incorporate well-established security principles such as least privilege and privilege separation. SLIM addresses the new architectural requirements posed by these principles in the context of cloud storage solutions, where in principle any action taken on behalf of tenant should be executed in a process with a tenant-specific privilege. We contrast this with typical cloud storage systems where the only mechanism for isolation is provided by the application-level cloud implementation. REFERENCES [1] P. Mell and T. Grance, The NIST definition of cloud computing, National Institute of Standards and Technology, Information Technology Laboratory, Tech. Rep., July [2] Y. Chen, V. Paxson, and R. H. Katz, What s new about cloud computing security? EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS , Jan [3] E. Davis, P. Fersht, and E. Herrera, Cloud will transform business as we know it: the secret s in the source, HfS Research, Tech. Rep., December [4] Welcome to Swift s documentation! September, [Online]. Available: [5] N. Hardy, The confused deputy: (or why capabilities might have been invented), SIGOPS Oper. Syst. Rev., vol. 22, no. 4, pp , Oct [6] J. Saltzer and M. Schroeder, The protection of information in computer systems, in Proceedings of the 4th ACM Symposium on Operating System Principles, October [7] N. Provos, Preventing privilege escalation, in Proceedings of the 12th USENIX Security Symposium, 2003, pp [8] B. Fitzpatrick, Distributed caching with memcached, Linux J., vol. 2004, no. 124, pp. 5, Aug [9] A. Lakshman and P. Malik, Cassandra: A decentralized structured storage system, Operating Systems Review, vol. 44, no. 2, p. 35, [10] E. K. Kolodner, et al., A cloud environment for data-intensive storage services, in Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science, ser. CLOUDCOM 11. Washington, DC, USA: IEEE Computer Society, 2011, pp [11] H. Chen, Y. Mao, X. Wang, D. Zhou, N. Zeldovich, and M. F. Kaashoek, Linux kernel vulnerabilities: state-of-the-art defenses and open problems, in Proceedings of the Second Asia-Pacific Workshop on Systems, ser. APSys 11. New York, NY, USA: ACM, 2011, pp. 5:1 5:5. [12] A. Kurmus, R. Tartler, D. Dorneanu, B. Heinloth, V. Rothberg, A. Ruprecht,, W. Schröder-Preikschat, D. Lohmann, and R. Kapitza, Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring, in Proceedings of the 20th Network and Distributed System Security Symposium, 2013, (to appear). [13] A. Kurmus, A. Sorniotti, and R. Kapitza, Attack Surface Reduction for Commodity OS Kernels, in Proceedings of the Fourth European Workshop on System Security, ser. EUROSEC 11. New York, NY, USA: ACM, 2011, pp. 6:1 6:6. [14] Overview of the seccomp sandbox, [Online]. Available: [15] R. Tartler, A. Kurmus, A. Ruprecht, B. Heinloth, V. Rothberg, D. Dorneanu, R. Kapitza, W. Schröder-Preikschat, and D. Lohmann, Automatic OS kernel TCB reduction by leveraging compile-time configurability, in Proceedings of the Eighth Workshop on Hot Topics in System Dependability, ser. HotDep 12, 2012.
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect [email protected] Validating if the workload generated by the load generating tools is applied
SharePoint 2013 Logical Architecture
SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center
With Great Power comes Great Responsibility: Managing Privileged Users
With Great Power comes Great Responsibility: Managing Privileged Users Darren Harmer Senior Systems Engineer Agenda What is a Privileged User Privileged User Why is it important? Security Intelligence
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
CIT 668: System Architecture
CIT 668: System Architecture Cloud Security Topics 1. The Same Old Security Problems 2. Virtualization Security 3. New Security Issues and Threat Model 4. Data Security 5. Amazon Cloud Security Data Loss
IBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
Scalable Multiple NameNodes Hadoop Cloud Storage System
Vol.8, No.1 (2015), pp.105-110 http://dx.doi.org/10.14257/ijdta.2015.8.1.12 Scalable Multiple NameNodes Hadoop Cloud Storage System Kun Bi 1 and Dezhi Han 1,2 1 College of Information Engineering, Shanghai
Potential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
Network Test Labs (NTL) Software Testing Services for igaming
Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Encrypt-FS: A Versatile Cryptographic File System for Linux
Encrypt-FS: A Versatile Cryptographic File System for Linux Abstract Recently, personal sensitive information faces the possibility of unauthorized access or loss of storage devices. Cryptographic technique
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
Mirantis OpenStack Express: Security White Paper
Mirantis OpenStack Express: Security White Paper Version 1.0 2005 2014 All Rights Reserved www.mirantis.com 1 Introduction While the vast majority IT professionals are now familiar with the cost-saving
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
How To Ensure Correctness Of Data In The Cloud
Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services
Making Data Security The Foundation Of Your Virtualization Infrastructure
Making Data Security The Foundation Of Your Virtualization Infrastructure by Dave Shackleford hytrust.com Cloud Under Control P: P: 650.681.8100 Securing data has never been an easy task. Its challenges
A Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
DMZ Gateways: Secret Weapons for Data Security
A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security EXECUTIVE
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 3 Firewalls Specific Instructional Objectives On completion of this lesson, the students will be able to answer: What a firewall is? What are the design goals of Firewalls
An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/
An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at
Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)
Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Double guard: Detecting Interruptions in N- Tier Web Applications
Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2014-2018 ISSN: 2249-6645 Double guard: Detecting Interruptions in N- Tier Web Applications P. Krishna Reddy 1, T. Manjula 2, D. Srujan Chandra Reddy 3, T. Dayakar
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Effective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
Elasticity in Multitenant Databases Through Virtual Tenants
Elasticity in Multitenant Databases Through Virtual Tenants 1 Monika Jain, 2 Iti Sharma Career Point University, Kota, Rajasthan, India 1 [email protected], 2 [email protected] Abstract -
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
An Approach Towards Customized Multi- Tenancy
I.J.Modern Education and Computer Science, 2012, 9, 39-44 Published Online September 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.09.05 An Approach Towards Customized Multi- Tenancy
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
Protecting the Cloud from Inside
Protecting the Cloud from Inside Intra-cloud security intelligence Protection of Linux containers Mitigation of NoSQL injections Alexandra Shulman-Peleg, PhD Cloud Security Researcher, IBM Cyber Security
Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk
About PaaS Security Donghoon Kim Henry E. Schaffer Mladen A. Vouk North Carolina State University, USA May 21, 2015 @ ICACON 2015 Outline Introduction Background Contribution PaaS Vulnerabilities and Countermeasures
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
SERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
Mirjam van Olst. Best Practices & Considerations for Designing Your SharePoint Logical Architecture
Mirjam van Olst Best Practices & Considerations for Designing Your SharePoint Logical Architecture About me http://sharepointchick.com @mirjamvanolst [email protected] Agenda Introduction Logical Architecture
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE
HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE IN THIRD-PARTY COMPUTE CLOUDS T. Ristenpart, H. Shacham, S. Savage UC San Diego E. Tromer MIT CPCS 722: Advanced Systems Seminar Ewa Syta GET
StorReduce Technical White Paper Cloud-based Data Deduplication
StorReduce Technical White Paper Cloud-based Data Deduplication See also at storreduce.com/docs StorReduce Quick Start Guide StorReduce FAQ StorReduce Solution Brief, and StorReduce Blog at storreduce.com/blog
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
Secure information storage
Secure information storage in a private cloud built upon local network resources Student Project for Large Installation Administration Master of Science in System and Network Engineering Universiteit van
Performance Evaluation of Shared Hosting Security Methods
Performance Evaluation of Shared Hosting Security Methods Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan Computer Engineering Department, Sharif University of Technology, International Campus,
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
The deployment of OHMS TM. in private cloud
Healthcare activities from anywhere anytime The deployment of OHMS TM in private cloud 1.0 Overview:.OHMS TM is software as a service (SaaS) platform that enables the multiple users to login from anywhere
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014
An Overview on Cloud Computing Services And Related Threats Bipasha Mallick Assistant Professor, Haldia Institute Of Technology [email protected] Abstract. Cloud computing promises to increase the velocity
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Security Threats in Cloud Computing Environments 1
Security Threats in Cloud Computing Environments 1 Kangchan Lee Electronics and Telecommunications Research Institute [email protected] Abstract Cloud computing is a model for enabling service user s ubiquitous,
POSIX and Object Distributed Storage Systems
1 POSIX and Object Distributed Storage Systems Performance Comparison Studies With Real-Life Scenarios in an Experimental Data Taking Context Leveraging OpenStack Swift & Ceph by Michael Poat, Dr. Jerome
IT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
Oracle Business Intelligence Enterprise Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on Oracle Enterprise Linux 4 update 5 x86_64
122-B CERTIFICATION REPORT No. CRP250 Business Intelligence Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on update 5 Issue 1.0 June 2009 Crown Copyright 2009 All Rights Reserved Reproduction
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
DATA SECURITY MODEL FOR CLOUD COMPUTING
DATA SECURITY MODEL FOR CLOUD COMPUTING POOJA DHAWAN Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001 [email protected] ABSTRACT Cloud Computing
Development and Evaluation of an Experimental Javabased
Development and Evaluation of an Experimental Javabased Web Server Syed Mutahar Aaqib Department of Computer Science & IT University of Jammu Jammu, India Lalitsen Sharma, PhD. Department of Computer Science
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
A Performance Analysis of Secure HTTP Protocol
A Performance Analysis of Secure Protocol Xubin He, Member, IEEE Department of Electrical and Computer Engineering Tennessee Technological University Cookeville, TN 3855, U.S.A [email protected] Abstract
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
INFORMATION SUPPLEMENT. Migrating from SSL and Early TLS. Version 1.0 Date: April 2015 Author: PCI Security Standards Council
Version 1.0 Date: Author: PCI Security Standards Council Executive Summary The time to migrate is now. For over 20 years Secure Sockets Layer (SSL) has been in the market as one of the most widely-used
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
Data Security in Cloud
Data Security in Cloud Mr. Pankaj Sareen Assistant Professor, Department of Computer Applications SPN College, Mukerian, Punjab [email protected] Dr. Tripat Deep Singh Assistant Professor, Department
Cloud Computing Architecture and Forensic Investigation Challenges
Cloud Computing Architecture and Forensic Investigation Challenges Ghania Al Sadi Sohar University, Computing Department Sohar, University Rd, 311 Sultanate of Oman ABSTRACT Contrasting to traditional
Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
BENCHMARKING CLOUD DATABASES CASE STUDY on HBASE, HADOOP and CASSANDRA USING YCSB
BENCHMARKING CLOUD DATABASES CASE STUDY on HBASE, HADOOP and CASSANDRA USING YCSB Planet Size Data!? Gartner s 10 key IT trends for 2012 unstructured data will grow some 80% over the course of the next
How To Get To A Cloud Storage And Byod System
Maginatics Security Architecture What is the Maginatics Cloud Storage Platform? Enterprise IT organizations are constantly looking for ways to reduce costs and increase operational efficiency. Although
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS Karen Scarfone, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Many people
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
USING VIRTUAL MACHINE REPLICATION FOR DYNAMIC CONFIGURATION OF MULTI-TIER INTERNET SERVICES
USING VIRTUAL MACHINE REPLICATION FOR DYNAMIC CONFIGURATION OF MULTI-TIER INTERNET SERVICES Carlos Oliveira, Vinicius Petrucci, Orlando Loques Universidade Federal Fluminense Niterói, Brazil ABSTRACT In
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
