Securing the IaaS Service Model of Cloud Computing Against Compromised Components

Cloud Computing is a new computing model, and its security aspects require special considerations. New characteristics of the cloud model have introduced new security challenges, and made some of the existing security techniques incompatible. Moreover, existing cloud environments are closed, operate...

Full description

Bibliographic Details
Main Author: TaheriMonfared, Aryan
Format: Others
Language:English
Published: Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk 2011
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13439
id ndltd-UPSALLA1-oai-DiVA.org-ntnu-13439
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-ntnu-134392013-01-08T13:32:48ZSecuring the IaaS Service Model of Cloud Computing Against Compromised ComponentsengTaheriMonfared, AryanNorges teknisk-naturvitenskapelige universitet, Institutt for telematikkInstitutt for telematikk2011ntnudaim:6107MSSECMOB Master in Security and Mobile ComputingCloud Computing is a new computing model, and its security aspects require special considerations. New characteristics of the cloud model have introduced new security challenges, and made some of the existing security techniques incompatible. Moreover, existing cloud environments are closed, operated by commercial providers, and their security mechanisms are proprietary as well as confidential. In other words, there is not much chance of observing how a real cloud environment is working, and how their providers adapt security measures to the new model.Therefore, we have chosen an open source cloud platform to build our own cloud environment. The OpenStack cloud software met our requirements, but it was not mature enough. We have done a deep analysis of this platform, identified potential attack targets in it, and discuss impacts of a successful attack.In order to secure our environment, the National Institute of Standards and Technology (NIST) incident handling guideline has been applied to the cloud model, and corresponding actions for each phase has been performed. To complete our study, we have proposed a set of cloud specific approaches that fulfill the incident handling requirements. These approaches address challenges identified in the guideline adaptation process. Additionally, we have studied the feasibility and compatibility of each approach against our deployed environment.Additionally, we also have submitted a paper to IEEE CloudCom 2011 conference, based on my thesis. A draft version of the paper is included in Appendix A. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13439Local ntnudaim:6107application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic ntnudaim:6107
MSSECMOB Master in Security and Mobile Computing

spellingShingle ntnudaim:6107
MSSECMOB Master in Security and Mobile Computing

TaheriMonfared, Aryan
Securing the IaaS Service Model of Cloud Computing Against Compromised Components
description Cloud Computing is a new computing model, and its security aspects require special considerations. New characteristics of the cloud model have introduced new security challenges, and made some of the existing security techniques incompatible. Moreover, existing cloud environments are closed, operated by commercial providers, and their security mechanisms are proprietary as well as confidential. In other words, there is not much chance of observing how a real cloud environment is working, and how their providers adapt security measures to the new model.Therefore, we have chosen an open source cloud platform to build our own cloud environment. The OpenStack cloud software met our requirements, but it was not mature enough. We have done a deep analysis of this platform, identified potential attack targets in it, and discuss impacts of a successful attack.In order to secure our environment, the National Institute of Standards and Technology (NIST) incident handling guideline has been applied to the cloud model, and corresponding actions for each phase has been performed. To complete our study, we have proposed a set of cloud specific approaches that fulfill the incident handling requirements. These approaches address challenges identified in the guideline adaptation process. Additionally, we have studied the feasibility and compatibility of each approach against our deployed environment.Additionally, we also have submitted a paper to IEEE CloudCom 2011 conference, based on my thesis. A draft version of the paper is included in Appendix A.
author TaheriMonfared, Aryan
author_facet TaheriMonfared, Aryan
author_sort TaheriMonfared, Aryan
title Securing the IaaS Service Model of Cloud Computing Against Compromised Components
title_short Securing the IaaS Service Model of Cloud Computing Against Compromised Components
title_full Securing the IaaS Service Model of Cloud Computing Against Compromised Components
title_fullStr Securing the IaaS Service Model of Cloud Computing Against Compromised Components
title_full_unstemmed Securing the IaaS Service Model of Cloud Computing Against Compromised Components
title_sort securing the iaas service model of cloud computing against compromised components
publisher Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk
publishDate 2011
url http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13439
work_keys_str_mv AT taherimonfaredaryan securingtheiaasservicemodelofcloudcomputingagainstcompromisedcomponents
_version_ 1716523514316455936