DocumentCode :
244058
Title :
Preservation of Security Configurations in the Cloud
Author :
Eghtesadi, Arash ; Jarraya, Yosr ; Debbabi, Mourad ; Pourzandi, Makan
Author_Institution :
Comput. Security Lab., Concordia Univ., Montreal, QC, Canada
fYear :
2014
fDate :
11-14 March 2014
Firstpage :
17
Lastpage :
26
Abstract :
The dynamic and elastic nature of cloud computing introduces new security challenges when it comes to maintaining consistent security configurations. This is emphasized by the fact that virtual machines are abruptly migrated between physical hosts, in the same or even in different data centers under different security policies. If security is not correctly enforced at the destination locations, and not properly updated in the source locations, security of the migrating virtual machine as well as the co-located machines can be compromised. In this paper, we intend to tackle this problem, specifically for intrusion detection/prevention and VPN/IPsec as main security mechanisms. More precisely, we propose a systematic verification approach to check the compliance of security configurations. To this end, we first elaborate on two properties, namely intrusion monitoring configuration preservation and VPN/IPsec protection configuration preservation. Then, we derive a set of formulas that compare security configurations before and after migration. This allows reasoning on whether the aforementioned security properties hold. To this end, we encode these formulas as constraint satisfaction problems. The obtained constraints are then submitted to a constraint solver, namely Sugar, in order to verify the properties and to pinpoint potential misconfiguration problems.
Keywords :
cloud computing; computer centres; constraint satisfaction problems; security of data; virtual machines; VPN-IPsec protection configuration preservation; cloud computing; co-located machines; constraint satisfaction problems; data centers; intrusion monitoring configuration preservation; physical hosts; pinpoint potential misconfiguration problems; security configuration preservation; security mechanisms; security policies; security properties; systematic verification approach; virtual machines; Cloud computing; Intrusion detection; Monitoring; Sugar; Virtual machining; Virtual private networks; Cloud Computing; Intrusion Detection; Security; VPN/IPsec; Verification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cloud Engineering (IC2E), 2014 IEEE International Conference on
Conference_Location :
Boston, MA
Type :
conf
DOI :
10.1109/IC2E.2014.14
Filename :
6903454
Link To Document :
بازگشت