DocumentCode :
606364
Title :
Defense-in-Depth Against Malicious Insiders in the Cloud
Author :
Rocha, F. ; Gross, T. ; Van Moorsel, Aad
Author_Institution :
Sch. of Comput. Sci., Newcastle Univ., Newcastle upon Tyne, UK
fYear :
2013
fDate :
25-27 March 2013
Firstpage :
88
Lastpage :
97
Abstract :
A critical challenge in cloud computing is assuring confidentiality and integrity for the execution of arbitrary software in a consumer´s virtual machine. The problem arises from having multiple virtual machines sharing hardware resources in the same physical host. A security critical resource is random access memory, which in the current version of the Xen hyper visor is vulnerable to attacks. Like previous work demonstrated, this vulnerability originates from Xen adopting avery permissive memory access model for its management virtual machine (Dom0). The model assumes it is safe to grant Dom0full access to the memory space allocated to consumer´s virtual machines. In this paper, we first present a sophisticated attack which makes it possible to compromise security-sensitive information resident in the memory area of a particular process executing in a virtual machine. The attack demonstration consists in subverting the new inter-virtual machine communication mechanism, libvchan, which is under development for the Xen hyper visor. This attack allows us to propose and implement a proof of concept for a lightweight mandatory memory access control mechanism for Xen, which achieves a better overall memory access model forDom0. We then propose an architecture which takes advantage of our memory protection mechanism and previous work to achievedefense in depth in cloud computing.
Keywords :
authorisation; cloud computing; virtual machines; Dom0; Xen hypervisor; arbitrary software; cloud computing; consumer virtual machine; hardware resources; intervirtual machine communication mechanism; libvchan; lightweight mandatory memory access control mechanism; malicious insiders; management virtual machine; permissive memory access model; security-sensitive information; Cryptography; Data structures; Hardware; Servers; Virtual machine monitors; Virtual machining; cloud security; malicious insider; mandatory access control; virtualization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cloud Engineering (IC2E), 2013 IEEE International Conference on
Conference_Location :
Redwood City, CA
Print_ISBN :
978-1-4673-6473-7
Type :
conf
DOI :
10.1109/IC2E.2013.20
Filename :
6529272
Link To Document :
بازگشت