NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2022
DOI: 10.1109/noms54207.2022.9789768
|View full text |Cite
|
Sign up to set email alerts
|

An Automated SMT-based Security Framework for Supporting Migrations in Cloud Composite Services

Abstract: The growing maturity of orchestration languages is contributing to the elaboration of cloud composite services, whose resources may be deployed over different distributed infrastructures. These composite services are subject to changes over time, that are typically required to support cloud properties, such as scalability and rapid elasticity. In particular, the migration of their elementary resources may be triggered by performance constraints. However, changes induced by this migration may introduce vulnerab… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…For instance, the authors of [16] propose an endogenous approach based on the generation of protected unikernel images, corresponding to lightweight virtual machines containing only the strict necessary packages and libraries in order to minimize the attack surface of cloud resources. We also started to work on securing composite services based on vulnerability descriptions expressed with the OVAL language [17], but without considering information disclosure issues [7]. Certification techniques, such as [18,19], have been considered for guaranteeing the behavior of cloud resources.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, the authors of [16] propose an endogenous approach based on the generation of protected unikernel images, corresponding to lightweight virtual machines containing only the strict necessary packages and libraries in order to minimize the attack surface of cloud resources. We also started to work on securing composite services based on vulnerability descriptions expressed with the OVAL language [17], but without considering information disclosure issues [7]. Certification techniques, such as [18,19], have been considered for guaranteeing the behavior of cloud resources.…”
Section: Related Workmentioning
confidence: 99%
“…It then requests cloud service providers to get configuration information regarding potential hosting environments, including the resource versioning and parameterization of these cloud environments, and also information regarding security mechanisms that may be implemented by the cloud providers. Considering this overall knowledge and using our OVAL 3 -based vulnerability assessment framework detailed in [7], the third party determines configuration vulnerabilities that may appear during the migration of resources over potential hosting environments. These assessment results enable the trusted third party to recommend or decline the migration of a given resource back to the cloud tenant, while reducing the disclosure of configuration information amongst involved cloud tenants and cloud providers.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, the authors of [16] propose an endogenous approach based on the generation of protected unikernel images, corresponding to lightweight virtual machines containing only the strict necessary packages and libraries in order to minimize the attack surface of cloud resources. We also started to work on securing composite services based on vulnerability descriptions expressed with the OVAL language [17], but without considering information disclosure issues [7]. Certification techniques, such as [18,19], have been considered for guaranteeing the behavior of cloud resources.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed tool, called CMSec (Cloud Migration Security), aims at preventing known vulnerabilities that may affect cloud composite services during the migration of their resources, through the assessment of their configurations and the selection of adequate countermeasures when vulnerabilities are identified. It corresponds to the implementation of the strategy that we have formalized in [6]. The CMSec architecture, detailed on Figure 1, has been prototyped using the Python language version 3.7, and relies on SMT solvers compatible with the SMT-LIB (Satisfiability Modulo Theories LIBrary) format [7] as back-end services.…”
Section: Cloud Migration Security Toolmentioning
confidence: 99%
“…This latter relies on a set of vulnerability descriptions from the official OVAL repository (Arrow 5). The vulnerability assessment process is formalized as a satisfiability issue [6], by considering the vulnerability descriptions together with the resource projection, and generates an SMT-LIB specification. Our assessor building block then exploits the CVC4 SMT solver to interpret and solve this SMT-LIB specification, and therefore determine whether the projection matches any vulnerable configurations.…”
Section: A Assessment Scenariomentioning
confidence: 99%