Preface |
|
xiii | |
Acknowledgment |
|
xvii | |
|
|
xix | |
|
|
xxiii | |
Author Bios |
|
xxv | |
|
I Fundamentals: Cloud Computing and Security |
|
|
1 | (72) |
|
1 Introduction to Cloud Computing |
|
|
3 | (22) |
|
|
3 | (3) |
|
1.2 History and Underlying Technologies |
|
|
6 | (5) |
|
1.2.1 Mainframe computing |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
1.2.4 Distributed and parallel computing |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
1.2.7 Service-oriented computing (SOC) |
|
|
10 | (1) |
|
|
10 | (1) |
|
1.3 Definitions and Characteristics |
|
|
11 | (1) |
|
|
12 | (2) |
|
1.4.1 Software-as-a-service (SaaS) |
|
|
13 | (1) |
|
1.4.2 Platform-as-a-service (PaaS) |
|
|
13 | (1) |
|
1.4.3 Infrastructure-as-a-service (IaaS) |
|
|
13 | (1) |
|
1.5 Cloud Deployment Models |
|
|
14 | (3) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
1.6 Cloud Service Platforms |
|
|
17 | (2) |
|
1.6.1 Amazon web service (AWS) |
|
|
17 | (1) |
|
|
17 | (1) |
|
1.6.3 Google cloud platform |
|
|
17 | (1) |
|
|
18 | (1) |
|
1.6.5 Adobe creative cloud |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
19 | (2) |
|
1.7.1 Virtual machine migration |
|
|
19 | (1) |
|
1.7.2 Interoperability and standards |
|
|
20 | (1) |
|
1.7.3 Security and privacy |
|
|
20 | (1) |
|
|
21 | (1) |
|
1.7.5 Accessibility issues |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (3) |
|
2 Introduction to Cloud Security |
|
|
25 | (24) |
|
|
25 | (6) |
|
2.1.1 Vulnerabilities present in cloud |
|
|
27 | (2) |
|
2.1.2 Need of cloud security |
|
|
29 | (2) |
|
2.2 Cloud Security Concepts |
|
|
31 | (3) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
2.3 Cloud Security Standards |
|
|
34 | (3) |
|
2.3.1 Information technology infrastructure library (ITIL) |
|
|
34 | (1) |
|
2.3.2 Control objectives for information and related technology (COBIT) |
|
|
35 | (1) |
|
|
36 | (1) |
|
2.3.4 Statement on standards for attestation engagement (SSAE) |
|
|
36 | (1) |
|
2.3.5 Cloud security alliance (CSA) cloud controls matrix |
|
|
36 | (1) |
|
2.4 CSA Cloud Reference Model |
|
|
37 | (3) |
|
2.5 NIST Cloud Reference Model |
|
|
40 | (6) |
|
2.5.1 Architectural components of consumer |
|
|
40 | (3) |
|
2.5.2 Architectural components of CSP |
|
|
43 | (1) |
|
2.5.3 Architectural components of broker |
|
|
44 | (1) |
|
2.5.4 Architectural components of carrier |
|
|
45 | (1) |
|
2.5.5 Architectural components of auditor |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (3) |
|
3 Cloud Security and Privacy Issues |
|
|
49 | (24) |
|
|
49 | (2) |
|
3.2 Cloud Security Goals/Concepts |
|
|
51 | (3) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
3.3 Cloud Security Issues |
|
|
54 | (8) |
|
3.3.1 Application level security issues |
|
|
55 | (1) |
|
3.3.2 Network level security issues |
|
|
56 | (1) |
|
3.3.3 Virtualization level security issues |
|
|
57 | (1) |
|
|
57 | (1) |
|
3.3.5 Identity management and access control |
|
|
58 | (1) |
|
3.3.6 Improper cryptographic keys management |
|
|
59 | (1) |
|
3.3.7 Service level agreement (SLA) |
|
|
60 | (1) |
|
3.3.8 Regular audit and compliances |
|
|
60 | (1) |
|
3.3.9 Cloud and CSP migration, SLA and trust level issues |
|
|
61 | (1) |
|
3.3.10 Hardware-level security issues |
|
|
62 | (1) |
|
3.4 Security Requirements for Privacy |
|
|
62 | (5) |
|
3.4.1 Fine-grained access control |
|
|
66 | (1) |
|
|
66 | (1) |
|
3.4.3 Collision resistance |
|
|
66 | (1) |
|
3.5 Privacy Issues in Cloud |
|
|
67 | (4) |
|
3.5.1 Defining roles to actors |
|
|
67 | (1) |
|
|
68 | (1) |
|
3.5.3 Legal issues and multi-location issues |
|
|
68 | (1) |
|
3.5.4 Privacy issues on CIA |
|
|
69 | (1) |
|
3.5.5 Protection of the data |
|
|
69 | (1) |
|
3.5.6 User control lacking |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (2) |
|
II Threat Model, Attacks, Defense Systems, and Security Techniques |
|
|
73 | (58) |
|
4 Threat Model and Cloud Attacks |
|
|
75 | (18) |
|
|
75 | (1) |
|
|
76 | (5) |
|
4.2.1 Type of attack entities |
|
|
76 | (2) |
|
4.2.2 Attack surfaces with attack scenarios |
|
|
78 | (3) |
|
4.3 A Taxonomy of Attacks |
|
|
81 | (5) |
|
4.3.1 VMAT: Virtual machines-level attacks |
|
|
81 | (2) |
|
4.3.2 VMMAT: Virtual machine monitor-level attacks |
|
|
83 | (1) |
|
4.3.3 HWAT: Peripheral-level attacks |
|
|
83 | (1) |
|
4.3.4 VSWAT: Virtual storage-level attacks |
|
|
84 | (1) |
|
4.3.5 TENAT: Tenant network-level attacks |
|
|
85 | (1) |
|
4.4 Case Study: Description of Features for Attack Analysis Based on Dataset |
|
|
86 | (5) |
|
|
86 | (2) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (2) |
|
5 Classification of Intrusion Detection Systems in Cloud |
|
|
93 | (16) |
|
|
93 | (1) |
|
5.2 TVM-based Intrusion Detection System |
|
|
94 | (3) |
|
5.3 Hypervisor-based Intrusion Detection System |
|
|
97 | (1) |
|
5.4 Network-based Intrusion Detection System |
|
|
98 | (3) |
|
5.5 Distributed Intrusion Detection System |
|
|
101 | (2) |
|
|
103 | (3) |
|
|
106 | (1) |
|
|
106 | (3) |
|
6 Intrusion Detection Techniques in Cloud |
|
|
109 | (22) |
|
|
109 | (2) |
|
6.2 Taxonomy of IDS Techniques |
|
|
111 | (17) |
|
6.2.1 Misuse detection techniques |
|
|
111 | (4) |
|
6.2.2 Anomaly detection techniques |
|
|
115 | (6) |
|
6.2.3 Virtual machine introspection (VMI) techniques |
|
|
121 | (1) |
|
6.2.4 Hypervisor introspection-based techniques |
|
|
122 | (1) |
|
|
123 | (5) |
|
|
128 | (1) |
|
|
128 | (3) |
|
|
131 | (58) |
|
7 Overview of Tools (Attack/Security) in Cloud |
|
|
133 | (20) |
|
|
133 | (2) |
|
|
135 | (5) |
|
7.2.1 Network-level attack tools |
|
|
135 | (3) |
|
7.2.2 VM-level attack tools |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
140 | (6) |
|
7.3.1 Network security tools |
|
|
141 | (1) |
|
|
142 | (2) |
|
|
144 | (2) |
|
7.4 Case Study of LibVMI: A Virtualziation-Specific Tool |
|
|
146 | (5) |
|
7.4.1 Check the system configurations |
|
|
146 | (1) |
|
7.4.2 Install KVM and necessary dependencies |
|
|
146 | (1) |
|
7.4.3 Creating a virtual machine |
|
|
147 | (1) |
|
7.4.4 Install LibVMI tool and necessary dependencies |
|
|
148 | (3) |
|
|
151 | (1) |
|
|
151 | (2) |
|
8 Virtual Machine Introspection and Hypervisor Introspection |
|
|
153 | (18) |
|
|
153 | (1) |
|
8.2 Virtual Machine Introspection (VMI) |
|
|
154 | (9) |
|
|
154 | (1) |
|
8.2.2 VM-state information based |
|
|
155 | (2) |
|
8.2.3 Hypercall verification based |
|
|
157 | (2) |
|
8.2.4 Guest OS kernel debugging based |
|
|
159 | (1) |
|
8.2.5 VM interrupt analysis based |
|
|
160 | (3) |
|
8.3 Hypervisor Introspection (HVI) |
|
|
163 | (6) |
|
8.3.1 Nested virtualization |
|
|
163 | (2) |
|
8.3.2 Code integrity checking using hardware-support |
|
|
165 | (2) |
|
8.3.3 Memory integrity checking using hardware/software support |
|
|
167 | (1) |
|
8.3.4 Revisiting the VMM design |
|
|
167 | (2) |
|
8.3.5 VM-assisted hypervisor introspection |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
169 | (2) |
|
|
171 | (18) |
|
|
171 | (2) |
|
9.2 Threat Model in Containerized Environment |
|
|
173 | (4) |
|
9.2.1 Attacks in containers |
|
|
175 | (2) |
|
|
177 | (2) |
|
9.4 Case Study on SQL Injection Attack in Containers |
|
|
179 | (6) |
|
9.4.1 Part-A-test bed set up |
|
|
180 | (4) |
|
9.4.2 PART B: Attacking launching and malicious logs extraction |
|
|
184 | (1) |
|
9.5 Open Research Challenges for Container Security |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (2) |
Bibliography |
|
189 | (22) |
Index |
|
211 | |