Securing the IaaS Service Model of Cloud Computing Against Compromised Components
Cloud Computing is a new computing model, and its security aspects require special considerations. New characteristics of the cloud model have introduced new security challenges, and made some of the existing security techniques incompatible. Moreover, existing cloud environments are closed, operate...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk
2011
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13439 |
id |
ndltd-UPSALLA1-oai-DiVA.org-ntnu-13439 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-ntnu-134392013-01-08T13:32:48ZSecuring the IaaS Service Model of Cloud Computing Against Compromised ComponentsengTaheriMonfared, AryanNorges teknisk-naturvitenskapelige universitet, Institutt for telematikkInstitutt for telematikk2011ntnudaim:6107MSSECMOB Master in Security and Mobile ComputingCloud Computing is a new computing model, and its security aspects require special considerations. New characteristics of the cloud model have introduced new security challenges, and made some of the existing security techniques incompatible. Moreover, existing cloud environments are closed, operated by commercial providers, and their security mechanisms are proprietary as well as confidential. In other words, there is not much chance of observing how a real cloud environment is working, and how their providers adapt security measures to the new model.Therefore, we have chosen an open source cloud platform to build our own cloud environment. The OpenStack cloud software met our requirements, but it was not mature enough. We have done a deep analysis of this platform, identified potential attack targets in it, and discuss impacts of a successful attack.In order to secure our environment, the National Institute of Standards and Technology (NIST) incident handling guideline has been applied to the cloud model, and corresponding actions for each phase has been performed. To complete our study, we have proposed a set of cloud specific approaches that fulfill the incident handling requirements. These approaches address challenges identified in the guideline adaptation process. Additionally, we have studied the feasibility and compatibility of each approach against our deployed environment.Additionally, we also have submitted a paper to IEEE CloudCom 2011 conference, based on my thesis. A draft version of the paper is included in Appendix A. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13439Local ntnudaim:6107application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
ntnudaim:6107 MSSECMOB Master in Security and Mobile Computing |
spellingShingle |
ntnudaim:6107 MSSECMOB Master in Security and Mobile Computing TaheriMonfared, Aryan Securing the IaaS Service Model of Cloud Computing Against Compromised Components |
description |
Cloud Computing is a new computing model, and its security aspects require special considerations. New characteristics of the cloud model have introduced new security challenges, and made some of the existing security techniques incompatible. Moreover, existing cloud environments are closed, operated by commercial providers, and their security mechanisms are proprietary as well as confidential. In other words, there is not much chance of observing how a real cloud environment is working, and how their providers adapt security measures to the new model.Therefore, we have chosen an open source cloud platform to build our own cloud environment. The OpenStack cloud software met our requirements, but it was not mature enough. We have done a deep analysis of this platform, identified potential attack targets in it, and discuss impacts of a successful attack.In order to secure our environment, the National Institute of Standards and Technology (NIST) incident handling guideline has been applied to the cloud model, and corresponding actions for each phase has been performed. To complete our study, we have proposed a set of cloud specific approaches that fulfill the incident handling requirements. These approaches address challenges identified in the guideline adaptation process. Additionally, we have studied the feasibility and compatibility of each approach against our deployed environment.Additionally, we also have submitted a paper to IEEE CloudCom 2011 conference, based on my thesis. A draft version of the paper is included in Appendix A. |
author |
TaheriMonfared, Aryan |
author_facet |
TaheriMonfared, Aryan |
author_sort |
TaheriMonfared, Aryan |
title |
Securing the IaaS Service Model of Cloud Computing Against Compromised Components |
title_short |
Securing the IaaS Service Model of Cloud Computing Against Compromised Components |
title_full |
Securing the IaaS Service Model of Cloud Computing Against Compromised Components |
title_fullStr |
Securing the IaaS Service Model of Cloud Computing Against Compromised Components |
title_full_unstemmed |
Securing the IaaS Service Model of Cloud Computing Against Compromised Components |
title_sort |
securing the iaas service model of cloud computing against compromised components |
publisher |
Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk |
publishDate |
2011 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13439 |
work_keys_str_mv |
AT taherimonfaredaryan securingtheiaasservicemodelofcloudcomputingagainstcompromisedcomponents |
_version_ |
1716523514316455936 |