TO ISOLATE THE VIRTUAL SIDE CHANNEL ATTACK IN CLOUD

advertisement
ISSN:2229-6093
Hardeep Kaur et al, Int.J.Computer Technology & Applications,Vol 5 (6),2040-2044
TO ISOLATE THE VIRTUAL SIDE CHANNEL ATTACK IN CLOUD
ENVIRONMENT
Hardeep Kaur
Department of Computer Science Engineering
Lovely Professional University Jalandhar,
Punjab, India
Email: hardeepkaurkahlon@yahoo.in
Richa Sapra
Assistant Professor, Department of Computer
Science Engineering
Lovely Professional University Jalandhar,
Punjab, India
Email: richa.16859@lpu.co.in
Abstract
Security and privacy of user’s data is a big concern
in cloud computing. Though cloud computing has
many advantages, it still faces many security and
privacy issues. A user may loss his data due to
malware attack or network outage. Cloud gives
provider an opportunity to analyse user data for a
long period. Also the outside attacker can analyse
and access the data and violate the user privacy by
managing to get access to the cloud. As cloud
computing allow virtual resource sharing, and
sharing of resources among potential untrusted
tenants can result in an increased risk of
information leakage due to vulnerability of virtual
resources causing side channel attacks. An access
control policy such as RBAC can be used to control
the data sharing among cloud customers. But, an
unintelligent cloud
resources management
mechanism can significantly increase the risk of
data leakage among roles. An attacker place a
virtual machine and all the traffic of the legitimate
user will directed to the attackers virtual machine.
The attacker will hijack all the credentials of the
legitimate user, and present it to server on the
behalf of the legitimate user. A novel technique is
proposed to isolate the side channel attack in RoleBased Multi-Tenancy Access Control Scheme.
1. Introduction
Cloud computing is a biggest-scale computing
paradigm which is focused by economies of
scale. It is a pool of managed computing
power, dynamically scalable, virtualized,
abstracted, platforms, pool of storage and
services are delivered on request of customers
through internet. Cloud computing is internetbased computing, where different services as
servers, storage and applications are provided
to an organization or individual customers.
Cloud computing allow their customers to put
and get their information and data into cloud.
The customer got all types of services from
cloud through internet. When users use a
cloud service, they saw virtual view. In cloud
IJCTA | Nov-Dec 2014
Available online@www.ijcta.com
data and services are distributed at different
locations. As the cloud is based on the web
service and web service is based on the
internet. Internet has its own security
weakness. As it is open and it has many
attacks and threats. Cloud computing focuses
on
sharing the
information
and
computations over network of nodes which
is scalable. E.g. the nodes include end user
and Web Service, data-center. Theses network
of nodes form a cloud. The main idea is to use
the infrastructure in order to bring all feasible
services to the cloud and to make it possible
to access those services irrespective of
time and location [1].
A. Basic cloud computing Architecture
Cloud computing Service models
Software as a service: applications are
developed and hosted on clouds. Without the
need of installing any program or software on
user’s computer, it supports user interaction
with the applications. E.g. salesforce.com.
Platform as a service: It allows the users to
build applications by delivering the services
like development tools, platforms where user
can also run their applications. E.g. Google
app engine, windows Azure.
Infrastructure as a Service: It provides
storage and computing capabilities as
standardized services. In IaaS storage systems
and servers are integrated or pooled together
E.g. amazon web services [2].
Cloud computing Deployment models
Public cloud: Public cloud can be accessed
by any subscriber with an internet connection
and access to the cloud space.
2040
ISSN:2229-6093
Hardeep Kaur et al, Int.J.Computer Technology & Applications,Vol 5 (6),2040-2044
Private cloud:
Private cloud can be
established for a specific group or organization
and limits access to just that group.
Hybrid cloud: In Hybrid cloud environment,
organization consumes resources from both
private and public clouds.
Community cloud: A community cloud is
shared among two or more organizations that
have similar cloud requirements [3].
B. Virtual side channel attack
An attacker compromised the cloud system
through placing his malicious virtual machine
to target system server. Attacker first map
where the virtual machine is resides on the
cloud and then attack by placing his virtual
machine on target machine. Then attacker
extracts the information from targeted virtual
machine known as virtual side channel attacks.
It has two steps:
1) Placement:
machine.
placing
malicious
virtual
2) Extraction: getting information of user’s
data.
C. Access Control, Authentication and
ID Management
The many techniques have been proposed for
the access control. . Cloud needs a user based
access control method, where every customer
can request to any service provider. User is
bounded with the user id and entitlement data
information. Role based access control is the
efficient and reliable technique for access
control methods. In the role based access
control method, the user can prove its identity
to cloud service provider through the secure
authentication procedure. User id will have
attributes or identifiers that find and define the
user. There should be a strong Identity
Management and authentications for the client
and the cloud provider.
D. Role based access control
Role based access control model has two
phases, which are used to assign a privilege to
users. In the first part, many-to-many user-role
assignments are provided. In second part,
many-to-many permission to role assignment
is given. Roles can have role hierarchies which
affect the authority and responsibilities of an
organization [4].
IJCTA | Nov-Dec 2014
Available online@www.ijcta.com
Users are the members of roles and all
authorizations to users are given through roles.
Users get the roles authorization to access
objects. The access to an object is controlled
by roles.
According to allocated roles, a user can
perform
certain
operations
through
permissions. When a user want to perform
some actions, certain type of authority is
required. For this authority of proper role has
to be granted to a user to perform some
actions.
Password
Login
Role Tables
Policies
User id Role based
assignment
role RBAC
Fig.1 Role based access control model
2. Literature Review
Shin-Jer Yang, et.al (2013), proposed a
cloud service model ,using identity
management and Role-Based Access Control,
under a multi –tenant architecture (MTA), to
propose and design a Role-Based MultiTenancy Access Control (RB-MTAC). This
model combines identity management and
role based access control of multi tenancy in
cloud environment ,to manage privileges for
providing protect of the security of application
and data privacy. Each tenant can build an
independent database or multi-tenants can
share the same database. Data of different
tenants could be stored in same place and that
can prevent other tenants using data and
system of that tenant. User login with an
account no and system authenticates the user
accounts through identity management. For
valid users, a role assignment capture roles
corresponding to user from database and
assign the role and access right which belong
to the user[5].
Ravi S. Sandhu, et.al (1996), discuss about
the family of models for role base access
control. In
RBAC permissions are associated with roles
and users are the members of roles. The role
brings together a set of permissions on one
side and a set of users on another side. The
2041
ISSN:2229-6093
Hardeep Kaur et al, Int.J.Computer Technology & Applications,Vol 5 (6),2040-2044
author describes a framework of reference
models to address the components of RBAC,
and their interactions. The author defined four
reference models: base model (RBAC0),
advanced models (RBAC1 and RBAC2),
consolidate model (RBAC3). The base model,
defines the minimum requirements for any
system that support RBAC. RBAC1 add
concept of role hierarchy.
RBAC2 add
constraints and consolidated model, RBAC3,
includes RBAC1 and RBAC2 and RBAC0. A
management model is also specified to manage
the RBAC itself [6].
Karsten Sohr, et.al (2008), Discuss nontemporal and history-based authorization
constraints in the Object Constraint Language
(OCL) and first-order linear temporal logic
(LTL). Author also verify role-based access
control policies with the help of a theorem
prover and validate policies with the USE
system tool, a validation tool for OCL
constraints. UML/OCL system is used in use
case to formulate RBAC policies. USE is
employed to validate authorization constraints.
Various conflicts b/w authorization constraints
and missing conflicts detected with the help of
USE.RBAC policies is a hierarchical RBAC
and set of authorization constraints defined for
organization. An authorization engine is also
described for enforcement of authorization
constraints. Authorization constraint are used
to design architect polices and express higher
level organization rules [7].
Xiao-Yong Li, et.al (2010), proposed a multi
tenancy based access control (MTACM)
model to embed the security duty separation
principle in cloud. This model has a two
granule level access control mechanism, i.e. a
tenant granule level access control for CSP to
compartmentalize different customers, and
application granule for customers to control
the access to their own application. MTACM
based system can be deployed at application
perimeter, defining different management
domain for CSP and customers, providing
different security function management
interface at tenant and application granule. The
author described model for the application
security in public cloud. The basic rule related
to tenant and application i.e. tenant rule and
application rule are defined. A prototype of
MTACM is also implemented for high
performance and compatibility [8].
IJCTA | Nov-Dec 2014
Available online@www.ijcta.com
Shin-Jer Yang, et.al (2007), authors proposed
a new approach ISPWAP, to integrate security
and performance aspects for web based
applications. ISPWAP combines SWAP and
RBAC frameworks. This approach is proposed
to fix the security holes and improve the
processing performance during in designing
the web- based applications. Authors proposed
ISPWAP framework design its algorithm and
defined how to implement the secure web
based application with tuning performance.
The approach provides a solution for
eliminating security risk and improving system
throughput in designing web based
applications. Various design issue for security
like access control, SQL injection, session
hijacking,
information
disclosure
and
performance related issues like time for
accessing web pages and manipulating
database are defined [9].
3. Existing technique
A role based multi-tenancy access control
(RB-MTAC) using identity management and
role based access control under multitenant
architecture combines the concept of multiple
tenants and the characteristics of RBAC. In
RB-MTAC each user is assigned one to many
roles while each role is assigned to many
privileges. This model manage privileges for
providing protect of the security of application
and data privacy .This model also block a nontenant user accessing using identity
management and access control prevent tenant
users to viewing and accessing application
and database without specific privilege .This
method use a mechanism to manage user
privilege using role based view point , and
administrator only need to modify role
privileges to change user privileges and thus
reduce the potential errors from constant
modification. Each tenant can build an
independent database or multi-tenants can
share the same database. Data of different
tenants could be stored in same place and that
can prevent other tenants using data and
system of that tenant.
Every tenant/user log in with id and password
and identity management system authenticates
the user account. If user is valid, the role
assignment will capture the role corresponding
to the user from RB-MTAC database and
assign the roles and access rights to the users.
The user account then integrate the functional
2042
ISSN:2229-6093
Hardeep Kaur et al, Int.J.Computer Technology & Applications,Vol 5 (6),2040-2044
privilege within role set through functionbased access control, generating the access
control list and
provide encryption and
privacy security services.
4. Problem formulation
The many techniques have been proposed for
the access control. Among the entire
techniques role based access control is the
efficient and reliable technique for access
control. In role based access control technique
legitimate user can prove its identity to cloud
service provider through the secure
authentication procedure. According to user
rights, the access is provided to the user. The
main problem in such technique is security.
Many security attacks are possible in role
based access control technique. The new
technique is developed which is based on the
identification and role based access control
modals. This technique is the hybrid type of
technique. In this technique the side channel
attack is possible, In which attacker place the
virtual machine and all the traffic of the
legitimate user will directed to the attackers
virtual machine. The attacker will hijack all
the credentials of the legitimate user, and
present it to server on the behalf of the
legitimate user. To prevent the side channel
attack, we will enhance the “Role-Based
Multi-Tenancy Access Control”.
5. Research methodology
Access control methods, allows, denies or
restricts access to a system. It monitors and
record all attempts made to access a system.
Access Control may also identify unauthorized
users attempting to access a system. It is a
mechanism which is very much important for
protection in computer security. Various
access control models like Mandatory Access
Control (MAC), Discretionary Access Control
(DAC) and Role Based Access Control
(RBAC) are in use. All these models are
known as identity based access control
models. In all these access control models,
user (subjects) and resources (objects) are
identified by unique names. Identification may
be done directly or through roles assigned to
the subjects. These access control methods are
effective in unchangeable distributed system,
where there are only a set of Users with a
known set of services. The side channel attack
is possible in RB-MTAC and it will reduce the
IJCTA | Nov-Dec 2014
Available online@www.ijcta.com
network reliability and security of the network
will be compromised. To prevent the side
channel attack, novel technique will be
proposed which is based on the server
identification. Before present its credentials to
the server, legitimate client will ask sever for
its credentials.
START
Deploy the cloud architecture with fixed number
of users, third party and cloud services provider
Apply role based technique to assign roles to users
Trigger virtual side channel attack in the cloud
architecture and analyze the network performance
Apply KAMAN protocol for user
and virtual machine authentication
V.M are
authenticated
successfully
no
yes
EXIT
Fig. 2 flow chart for proposed technique
If the sever credentials are verified by the
client then further process will proceed
otherwise algorithm will halt.
6. Conclusion
As cloud computing is accepted widely all
around the world, it has many benefits like
large storage space, easy access to system
anytime and anywhere, cost effective etc. With
these benefits of cloud computing some
security issues needs to be spotted that assure
safe, reliable internet service. As multi-
2043
ISSN:2229-6093
Hardeep Kaur et al, Int.J.Computer Technology & Applications,Vol 5 (6),2040-2044
tenancy and virtualization features of cloud
computing enhanced the resource utilization.
However cloud computing has many security
challenges that are
exacerbated by virtual
resource sharing. The sharing of resources
among potential untrusted tenants can result in
an increased risk of information leakage due to
vulnerability of virtual resources causing side
channel attacks or VM escape. For big data
application, an access control policy such as
RBAC can be used to control the data sharing
among cloud customers. In this technique the
side channel attack is possible. “Role-Based
Multi-Tenancy Access Control Scheme”, will
be enhanced to prevent the side channel attack.
engineering(CISE),pp. 1-4, Wuhan, China,
December 10-12-2010.
[9] Shin-jer Yang Jia-Shin Chen, Kuei- Chin
Chen, “ A study of security and performance
issues in designing Web based applications,”
in proc. Of IEEE international conference on
e-business engineering (ICEBE),pp.81-88,
October 24-26,2007.
References
[1] Torry Haarris “cloud computing – an
overview”.
[2] K.shirisha reddy, Dr. M.Balaraju“An
integrated approach of data storage and
security in cloud computing” international
journal of application or innovation in
engineering & management (IJAIEM) volume
1, Issue4, December 2012.
[3] K.shirisha reddy, dr. M.Balaraju“An
integrated approach of data storage and
security in cloud computing” international
journal of application or innovation in
engineering & management (IJAIEM)volume
1,Issue4, december 2012.
[4] Gitanjali (2013)” Policy Specification in
Role based Access Control on Clouds”
International
Journal
of
Computer
Applications (0975 – 8887) Volume 75– No.1.
[5] Shin-jer,Yang pei-ci Lai, Jyhjong Lin
“Design role-based Multi-Tenancy Access
control
scheme
for
cloud
services”
international symposium on biometrics and
security technologies, IEEE 2013.
[6] Ravi S.Sandhu, Edward. Coynek, Hal
L.Feinsteink and Charles E. Youmank “Role
Based access control Models”IEE computer
volume 29, no.-2, pages 38-47, February 1996.
[7] Karsten Sohr, Michel Drouineaud, gailJoon Ahn “Analysing and managing Rolebased access control policies,” IEE transaction
on knowledge and data engineering (TKDE),
vol.20, no 7,pp. 924-939, july 2008.
[8] Xiao-Yyong Li,Yong Shi,Yu Guo, Wei
Ma, “ Multi-Tenancy based access control in
cloud,” in proc. Of international conference on
computing
intelligence
and
software
IJCTA | Nov-Dec 2014
Available online@www.ijcta.com
2044
Download