Visible to the public Securing Software Application Chains in a CloudConflict Detection Enabled

TitleSecuring Software Application Chains in a Cloud
Publication TypeConference Proceedings
Year of Publication2015
AuthorsDonghoon Kim, Mladen A. Vouk
Conference Name2nd International Conference on Information Science and Security (ICISS), 2015
Pagination1-4
Date Published14-16 December
PublisherIEEE
Conference LocationSeoul, Korea
KeywordsResilient Systems, science of security, Validation and Verification, Vulnerability and Resilience Prediction Models
Abstract

This paper presents an approach for securing software application chains in cloud environments. We use the concept of workflow management systems to explain the model. Our prototype is based on the Kepler scientific workflow system enhanced with a security analytics package. This model can be applied to other cloud based systems. Depending on the information being received from the cloud, this approach can also offer information about internal states of the resources in
the cloud. The approach we use hinges on (1) an ability to limit attacks to Input, Remote, and Output channels (or flows), and (2) validate the flows using operational profile (OP) or certification based signals. OP based validation is a statistical approach and may miss some of the attacks. However, where enumeration is possible (e.g., static web sites), this approach can offer high assurances of validity of the flows. It is also assumed that workflow components are sound so long as the input flows are limited to operational profile. Other acceptance testing approaches could be used to validate the flows. Work in progress has two thrusts: (1) using cloud-based Kepler workflows to probe and assess security states and operation of cloud resources (specifically VMs) under different workloads leveraging DACSA sensors; and (2) analyzing effectiveness of the proposed approach in securing workflows.

DOI10.1109/ICISSEC.2015.7371032
Citation Keynode-26872