https://www.mdu.se/

mdu.sePublications
Change search
Link to record
Permanent link

Direct link
Publications (10 of 13) Show all publications
Aslam, M., Gehrmann, C. & Björkman, M. (2015). ASArP: Automated Security Assessment & Audit of Remote Platforms: using TCG-SCAP synergies. Journal of Information Security and Applications, 22, 28-39
Open this publication in new window or tab >>ASArP: Automated Security Assessment & Audit of Remote Platforms: using TCG-SCAP synergies
2015 (English)In: Journal of Information Security and Applications, ISSN 2214-2134, E-ISSN 2214-2126, Vol. 22, p. 28-39Article in journal (Refereed) Published
Abstract [en]

Many enterprise solutions today are built upon complex distributed systems which are accessible to the users globally. Due to this global access, the security of the host platforms becomes critical. The platform administrators use security automation techniques such as those provided by Security Content Automation Protocol (SCAP) standards to protect the systems from the vulnerabilities that are reported daily; furthermore, they are responsible for keeping their systems compliant to the relevant security recommendations (governmental or industrial). Additionally, third party audit and certification processes are used to increase user trust in enterprise solutions. However, traditional audit and certification mechanisms are not continuous, that is, not frequent enough to deal with the daily reported vulnerabilities, and for that matter even auditors expect platform administrators to keep the systems updated. As a result, the end user is also forced to trust the platform administrators about the latest state of the platform. In this paper we develop an automated security audit and certification system (ASArP) which can be used by platform users or by third party auditors. We use security automation techniques for continuous monitoring of the platform security posture and make the results trustworthy by using trusted computing (TCG) techniques. The prototype development of ASArP validates the implementation feasibility; it also provides performance benchmarks which show that the ASArP based audit and certification can be done much more frequently (e.g. daily or weekly). The feasibility of ASArP based continuous audits is significantly better than traditional platform audits which are dependent on the physical presence of the auditors, thus making frequent audits much more expensive and operationally infeasible.

Place, publisher, year, edition, pages
United Kingdom: , 2015
National Category
Engineering and Technology Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:mdh:diva-25191 (URN)10.1016/j.jisa.2014.09.001 (DOI)000362220400004 ()2-s2.0-84951909927 (Scopus ID)
Available from: 2014-06-05 Created: 2014-06-05 Last updated: 2024-01-22Bibliographically approved
Aslam, M. (2014). Bringing Visibility in the Clouds: using Security, Transparency and Assurance Services. (Doctoral dissertation). Västerås: Mälardalen University
Open this publication in new window or tab >>Bringing Visibility in the Clouds: using Security, Transparency and Assurance Services
2014 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The evolution of cloud computing allows the provisioning of IT resources over the Internet and promises many benefits for both - the service users and providers. Despite various benefits offered by cloud based services, many users hesitate in moving their IT systems to the cloud mainly due to many new security problems introduced by cloud environments. In fact, the characteristics of cloud computing become basis of new problems, for example, support of third party hosting introduces loss of user control on the hardware; similarly, on-demand availability requires reliance on complex and possibly insecure API interfaces; seamless scalability relies on the use of sub-providers; global access over public Internet exposes to broader attack surface; and use of shared resources for better resource utilization introduces isolation problems in a multi-tenant environment. These new security issues in addition to existing security challenges (that exist in today's classic IT environments) become major reasons for the lack of user trust in cloud based services categorized in Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) or Infrastructure-as-a-Service (IaaS).

The focus of this thesis is on IaaS model which allows users to lease IT resources (e.g. computing power, memory, storage, etc.) from a public cloud to create Virtual Machine (VM) instances. The public cloud deployment model considered in this thesis exhibits most elasticity (i.e. degree of freedom to lease/release IT resources according to user demand) but is least secure as compared to private or hybrid models. As a result, public clouds are not trusted for many use cases which involve processing of security critical data such as health records, financial data, government data, etc. However, public IaaS clouds can also be made trustworthy and viable for these use cases by providing better transparency and security assurance services for the user. In this thesis, we consider such assurance services and identify security aspects which are important for making public clouds trustworthy. Based upon our findings, we propose solutions which promise to improve cloud transparency thereby realizing trustworthy clouds.

The solutions presented in this thesis mainly deal with the secure life cycle management of the user VM which include protocols and their implementation for secure VM launch and migration. The VM launch and migration solutions ensure that the user VM is always hosted on correct cloud platforms which are setup according to a profile that fulfills the use case relevant security requirements. This is done by using an automated platform security audit and certification mechanism which uses trusted computing and security automation techniques in an integrated solution. In addition to provide the assurance about the cloud platforms, we also propose a solution which provides assurance about the placement of user data in correct and approved geographical locations which is critical from many legal aspects and usually an important requirement of the user. Finally, the assurance solutions provided in this thesis increase cloud transparency which is important for user trust and to realize trustworthy clouds.

Place, publisher, year, edition, pages
Västerås: Mälardalen University, 2014
Series
Mälardalen University Press Dissertations, ISSN 1651-4238 ; 161
Keywords
Cloud Security, Trusted Computing, Trustworthy Clouds, Cloud Audits, Security Automation, SCAP, Virtual Machine
National Category
Computer Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:mdh:diva-25376 (URN)978-91-7485-156-4 (ISBN)
Public defence
2014-09-05, Kappa, Mälardalen University, Västerås, 10:00 (English)
Opponent
Supervisors
Available from: 2014-06-24 Created: 2014-06-24 Last updated: 2014-08-20Bibliographically approved
Paladi, N., Aslam, M. & Gehrmann, C. (2014). Trusted Geolocation Aware Data Placement in Infrastructure Clouds. In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications IEEE TrustCom-14: . Paper presented at 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications IEEE TrustCom-14, 24 Sep 2014, Beijing, China. Beijing, China
Open this publication in new window or tab >>Trusted Geolocation Aware Data Placement in Infrastructure Clouds
2014 (English)In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications IEEE TrustCom-14, Beijing, China, 2014Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
Beijing, China: , 2014
National Category
Engineering and Technology
Identifiers
urn:nbn:se:mdh:diva-25192 (URN)
Conference
13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications IEEE TrustCom-14, 24 Sep 2014, Beijing, China
Available from: 2014-06-05 Created: 2014-06-05 Last updated: 2014-12-29Bibliographically approved
Paladi, N., Aslam, M. & Gehrmann, C. (2014). Trusted Geolocation-Aware Data Placement in Infrastructure Clouds. In: 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM): . Paper presented at 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), SEP 24-26, 2014, Beijing, PEOPLES R CHINA (pp. 352-360). IEEE
Open this publication in new window or tab >>Trusted Geolocation-Aware Data Placement in Infrastructure Clouds
2014 (English)In: 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), IEEE , 2014, p. 352-360Conference paper, Published paper (Refereed)
Abstract [en]

Data geolocation in the cloud is becoming an increasingly pressing problem, aggravated by incompatible legislation in different jurisdictions and compliance requirements of data owners. In this work we present a mechanism allowing cloud users to control the geographical location of their data, stored or processed in plaintext on the premises of Infrastructure-as-a-Service cloud providers. We use trusted computing principles and remote attestation to establish platform state. We enable cloud users to confine plaintext data exclusively to the jurisdictions they specify, by sealing decryption keys used to obtain plaintext data to the combination of cloud host geolocation and platform state. We provide a detailed description of the implementation as well as performance measurements on an open source cloud infrastructure platform using commodity hardware.

Place, publisher, year, edition, pages
IEEE, 2014
Series
IEEE International Conference on Trust Security and Privacy in Computing and Communications, ISSN 2324-898X
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:mdh:diva-38396 (URN)10.1109/TrustCom.2014.47 (DOI)000380562600044 ()2-s2.0-84922983644 (Scopus ID)978-1-4799-6513-7 (ISBN)
Conference
13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), SEP 24-26, 2014, Beijing, PEOPLES R CHINA
Available from: 2018-02-09 Created: 2018-02-09 Last updated: 2020-11-18Bibliographically approved
Aslam, M., Gehrmann, C. & Björkman, M. (2013). Continuous Security Evaluation and Auditing of Remote Platforms by Combining Trusted Computing and Security Automation Techniques. In: SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks: . Paper presented at 6th International Conference on Security of Information and Networks, Nov 26-28, 2013, Aksaray, Turkey (pp. 136-143).
Open this publication in new window or tab >>Continuous Security Evaluation and Auditing of Remote Platforms by Combining Trusted Computing and Security Automation Techniques
2013 (English)In: SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks, 2013, p. 136-143Conference paper, Published paper (Refereed)
Abstract [en]

In many new distributed systems paradigms such a cloud computing, Internet of Things (IoT), electronic banking, etc. the security of the host platforms is very critical which is managed by the platform owner. The platform administrators use security automation techniques such as those provided by Security Content Automation Protocol (SCAP) standards to ensure that the outsourced platforms are set up correctly and follow the security recommendations (governmental or industry). However, the remote platform users still have to trust the platform administrators. The third party security audits, used to shift the required user trust from the platform owner to a trusted entity, are scheduled and are not very frequent to deal with the daily reported vulnerabilities which can be exploited by the attackers. In this paper we propose a remote platform evaluation mechanism which can be used by the remote platform users themselves, or by the auditors to perform frequent platform security audits for the platform users. We analyze the existing SCAP and trusted computing (TCG) standards for our solution, identify their shortcomings, and suggest ways to integrate them. Our proposed platform security evaluation framework uses the synergy of TCG and SCAP to address the limitations of each technology when used separately

National Category
Engineering and Technology
Identifiers
urn:nbn:se:mdh:diva-22270 (URN)10.1145/2523514.2523537 (DOI)2-s2.0-84893211730 (Scopus ID)9781450324984 (ISBN)
Conference
6th International Conference on Security of Information and Networks, Nov 26-28, 2013, Aksaray, Turkey
Available from: 2013-10-31 Created: 2013-10-31 Last updated: 2016-03-10Bibliographically approved
Rasmusson, L. & Aslam, M. (2012). Protecting Private Data in the Cloud. In: CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. Paper presented at The 2nd International Conference on Cloud Computing and Services Science, CLOSER 2012, 18-21 April 2012, Porto, Portugal (pp. 5-12). SciTePress
Open this publication in new window or tab >>Protecting Private Data in the Cloud
2012 (English)In: CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, SciTePress, 2012, p. 5-12Conference paper, Published paper (Refereed)
Abstract [en]

Companies that process business critical and secret data are reluctant to use utility and cloud computing for the risk that their data gets stolen by rogue system administrators at the hosting company. We describe a system organization that prevents host administrators from directly accessing or installing eaves-dropping software on the machine that holds the client’s valuable data. Clients are monitored via machine code probes that are inlined into the clients’ programs at runtime. The system enables the cloud provider to install and remove software probes into the machine code without stopping the client’s program, and it prevents the provider from installing probes not granted by the client.

Place, publisher, year, edition, pages
SciTePress: , 2012
Keywords
Cloud Computing, Virtualization, Trusted Computing, Binary Translation
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Computer Science
Identifiers
urn:nbn:se:mdh:diva-15240 (URN)2-s2.0-84864866703 (Scopus ID)978-989-8565-05-1 (ISBN)
Conference
The 2nd International Conference on Cloud Computing and Services Science, CLOSER 2012, 18-21 April 2012, Porto, Portugal
Funder
Vinnova
Available from: 2012-09-06 Created: 2012-09-06 Last updated: 2013-12-03Bibliographically approved
Aslam, M. (2012). Secure Service Provisioning in a Public Cloud. (Licentiate dissertation). Mälardalen Univsersity
Open this publication in new window or tab >>Secure Service Provisioning in a Public Cloud
2012 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

The evolution of cloud technologies which allows the provisioning of IT resources over the Internet promises many benefits for the individuals and enterprises alike. However, this new resource provisioning model comes with the security challenges which did not exist in the traditional resource procurement mechanisms. We focus on the possible security concerns of a cloud user (e.g. an organization, government department, etc.) to lease cloud services such as resources in the form of Virtual Machines (VM) from a public Infrastructure-as-a-Service (IaaS) provider. There are many security critical areas in the cloud systems, such as data confidentiality, resource integrity, service compliance, security audits etc. In this thesis, we focus on the security aspects which result in the trust deficit among the cloud stakeholders and hence hinder a security sensitive user to benefit from the opportunities offered by the cloud computing. Based upon our findings from the security requirements analysis,we propose solutions that enable user trust in the public IaaS clouds. Our solutions mainly deal with the secure life cycle management of the user VM which include mechanisms for VM launch and migration. The VM launch and migration solutions ensure that the user VM is always protected in the cloud by only allowing it to run on the user trusted platforms. This is done by using trusted computing techniques that allow the users to remotely attest and hence rate the cloud platforms trusted or untrusted. We also provide a prototype implementation to prove the implementation feasibility of the proposed trust enabling principles used in the VM launch and migration solutions.

Place, publisher, year, edition, pages
Mälardalen Univsersity, 2012. p. 140
Series
Mälardalen University Press Licentiate Theses, ISSN 1651-9256 ; 157
Keywords
VM migration, trusted platforms, cloud security, IaaS, TPM, Security, Trusted Computing, Virtualization, Cloud Computing, trust
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Computer Science
Identifiers
urn:nbn:se:mdh:diva-15243 (URN)978-91-7485-081-9 (ISBN)
Presentation
2012-10-09, Delta, Mälardalen University, Västerås, 13:15 (English)
Opponent
Supervisors
Funder
Vinnova
Available from: 2012-09-07 Created: 2012-09-06 Last updated: 2013-12-03Bibliographically approved
Aslam, M., Gehrmann, C., Rasmusson, L. & Björkman, M. (2012). Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud. In: CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science: . Paper presented at The 2nd International Conference on Cloud Computing and Services Science, CLOSER 2012, 18-21 April 2012, Porto, Portugal (pp. 511-521).
Open this publication in new window or tab >>Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud
2012 (English)In: CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, 2012, p. 511-521Conference paper, Published paper (Refereed)
Abstract [en]

In this paper we consider the Infrastructure-as-a-Service (IaaS) cloud model which allows cloud users to run their own virtual machines (VMs) on available cloud computing resources. IaaS gives enterprises the possibility to outsource their process workloads with minimal effort and expense. However, one major problem with existing approaches of cloud leasing, is that the users can only get contractual guarantees regarding the integrity of the offered platforms. The fact that the IaaS user himself or herself cannot verify the provider promised cloud platform integrity, is a security risk which threatens to prevent the IaaS business in general. In this paper we address this issue and propose a novel secure VM launch protocol using Trusted Computing techniques. This protocol allows the cloud IaaS users to securely bind the VM to a trusted computer configuration such that the clear text VM only will run on a platform that has been booted into a trustworthy state. This capability builds user confidence and can serve as an important enabler for creating trust in public clouds. We evaluate the feasibility of our proposed protocol via a full scale system implementation and perform a system security analysis.

Keywords
Security, Trusted Computing, Virtualization, Cloud Computing, IaaS
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Computer Science
Identifiers
urn:nbn:se:mdh:diva-15237 (URN)2-s2.0-84864878200 (Scopus ID)978-989-8565-05-1 (ISBN)
Conference
The 2nd International Conference on Cloud Computing and Services Science, CLOSER 2012, 18-21 April 2012, Porto, Portugal
Funder
Vinnova
Available from: 2012-09-06 Created: 2012-09-06 Last updated: 2014-06-24Bibliographically approved
Aslam, M., Gehrmann, C. & Björkman, M. (2012). Security and Trust Preserving VM Migrations in Public Clouds. In: Proceedings of the 11th IEEE International Conference onTrust, Security and Privacy in Computingand Communications (TrustCom-2012): . Paper presented at 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, UK, 25-27 June 2012 (pp. 869-876). IEEE Computer Society Digital Library
Open this publication in new window or tab >>Security and Trust Preserving VM Migrations in Public Clouds
2012 (English)In: Proceedings of the 11th IEEE International Conference onTrust, Security and Privacy in Computingand Communications (TrustCom-2012), IEEE Computer Society Digital Library, 2012, p. 869-876Conference paper, Oral presentation only (Refereed)
Abstract [en]

In this paper we consider the security and trustimplications of virtual machine (VM) migration from one cloudplatform to the other in an Infrastructure-as-a-Service (IaaS) cloud service model. We show how to extend and complement previous Trusted Computing techniques for secure VM launchto also cover the VM migration case. In particular, we propose a Trust_Token based VM migration protocol which guarantees that the user VM can only be migrated to a trustworthy cloud platform. Different from previous schemes, our solution is not dependent on an active (on-line) trusted third party. We show how our proposed mechanisms fulfill major security and trust requirements for secure VM migration in cloud environments.

Place, publisher, year, edition, pages
IEEE Computer Society Digital Library, 2012
Keywords
VM migration, trusted platforms, cloud security, IaaS, TPM
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Computer Science
Identifiers
urn:nbn:se:mdh:diva-15239 (URN)10.1109/TrustCom.2012.256 (DOI)2-s2.0-84868116561 (Scopus ID)978-0-7695-4745-9 (ISBN)
Conference
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, UK, 25-27 June 2012
Funder
VINNOVA
Available from: 2012-09-06 Created: 2012-09-06 Last updated: 2016-05-17Bibliographically approved
Paladi, N., Gehrmann, C. & Aslam, M. (2012). Trusted Launch of Virtual Machine Instances in Public IaaS Environments. In: Lecture Notes in Computer Science, vol 7839: Information Security and Cryptology – ICISC 2012. Paper presented at 15th International Conference, Seoul, Korea, November 28-30, 2012 (pp. 309-323). Paper presented at 15th International Conference, Seoul, Korea, November 28-30, 2012. Springer Berlin Heidelberg
Open this publication in new window or tab >>Trusted Launch of Virtual Machine Instances in Public IaaS Environments
2012 (English)In: Lecture Notes in Computer Science, vol 7839: Information Security and Cryptology – ICISC 2012, Springer Berlin Heidelberg , 2012, p. 309-323Chapter in book (Refereed)
Abstract [en]

Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security mechanism for IaaS. In this paper we present a protocol to ensure the launch of a virtual machine (VM) instance on a trusted remote compute host. Relying on Trusted Platform Module operations such as binding and sealingto provide integrity guarantees for clients that require a trusted VM launch, we have designed a trusted launch protocol for VM instances in public IaaS environments. We also present a proof-of-concept implementation of the protocol based on OpenStack, an open-source IaaS platform. The results provide a basis for the use of TC mechanisms within IaaS platforms and pave the way for a wider applicability of TC to IaaS security.

Place, publisher, year, edition, pages
Springer Berlin Heidelberg, 2012
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 7839
National Category
Engineering and Technology
Identifiers
urn:nbn:se:mdh:diva-22269 (URN)10.1007/978-3-642-37682-5_22 (DOI)978-3-642-37681-8 (ISBN)
Conference
15th International Conference, Seoul, Korea, November 28-30, 2012
Note

15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers

Available from: 2013-11-03 Created: 2013-10-31 Last updated: 2014-06-24Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-3223-4234

Search in DiVA

Show all publications