SlideShare a Scribd company logo
Cloud-Trust—a Security Assessment Model
for Infrastructure as a Service (IaaS) Clouds
Dan Gonzales, Member, IEEE, Jeremy M. Kaplan, Evan
Saltzman, Zev Winkelman, and Dulani Woods
Abstract—The vulnerability of cloud computing systems (CCSs)
to advanced persistent threats (APTs) is a significant concern to
government and industry. We present a cloud architecture
reference model that incorporates a wide range of security
controls and best
practices, and a cloud security assessment model—Cloud-
Trust—that estimates high level security metrics to quantify the
degree of
confidentiality and integrity offered by a CCS or cloud service
provider (CSP). Cloud-Trust is used to assess the security level
of four
multi-tenant IaaS cloud architectures equipped with alternative
cloud security controls. Results show the probability of CCS
penetration
(high value data compromise) is high if a minimal set of
security controls are implemented. CCS penetration probability
drops
substantially if a cloud defense in depth security architecture is
adopted that protects virtual machine (VM) images at rest,
strengthens
CSP and cloud tenant system administrator access controls, and
which employs other network security controls to minimize
cloud
network surveillance and discovery of live VMs.
Index Terms—Cloud computing, cyber security, advanced
persistent threats, security metrics, virtual machine (VM)
isolation
Ç
1 INTRODUCTION
THE flexibility and scalability of CCSs can offer signifi -cant
benefits to government and private industry [1],
[2]. However, it can be difficult to transition legacy software
to the cloud [3]. Concerns have also been raised as to
whether cloud users can trust CSPs to protect cloud tenant
data and whether CCSs can prevent the unauthorized dis-
closure of sensitive or private information. The literature is
rife with studies of CCS security vulnerabilities that can be
exploited by APTs [4], [5], [6], [7].
Virtualization, the basis for most CCSs, enables CSPs to
start, stop, move, and restart computing workloads on
demand. VMs run on computing hardware that may be
shared by cloud tenants. This enables flexibility and elastic-
ity, but introduces security concerns. The security status of
a CCS depends on many factors, including security applica-
tions running on the system, the hypervisor (HV) and asso-
ciated protection measures, the design patterns used to
isolate the control plane from cloud tenants, the level of pro-
tection provided by the CSP to cloud tenant user data and
VM images, as well as other factors.
These concerns raise questions. Can the overall security
status of a CCS or a CSP offering be assessed using a frame-
work that addresses the unique vulnerabilities of CCSs and
can such assessments be applied to alternative CCS architec-
tures and CSP offerings in an unbiased way? The federal
government has issued security controls that CSPs must
implement to obtain FEDRAMP CCS security certification [8]
that are based on National Institute of Standards and Tech-
nology (NIST) cloud security guidelines [1]. However, these
do not provide high-level decision-makers with an overall
assessment of CCS security status or the degree of confidenti -
ality and integrity offered by specific cloud architectures [9].
The main contributions of this paper are to develop a
CCS reference architecture and a cloud security assessment
model—Cloud-Trust—that provides quantitative high level
security assessments of IaaS CCSs and CSPs. Cloud-Trust
can assess the relative level of security offered by alternative
CSPs or cloud architectures. Cloud tenants can use it to
make decisions on which CSP security options or cloud
security features to implement. We illustrate the use of
Cloud-Trust by applying it to the case where the cloud ten-
ant is a U.S. government agency and examine how well four
alternative CCS architectures protect U.S. government data.
Cloud-Trust is based on CCS unique attack paths that
cover the essential elements of an IaaS cloud architecture. It
is based on a Bayesian network model of the CCS, the class
of APT attack paths spanning the CCS attack space, and the
APT attack steps required to implement each attack path. It
provides two key high-level security metrics to summarize
CCS security status quantitatively:
� Probability an APT can access high value data
� Probability the APT is detected by cloud tenant or
CCS security monitoring systems.
The first security metric estimates whether high value
data (designated as “Gold” data in this paper) is likely to be
compromised or erased from the CCS. The second metric
assesses whether the CSP provides cloud tenants sufficient
� D. Gonzales, J.M. Kaplan, Z. Winkelman, and D. Woods are
with the
RAND Corporation, Arlington, VA 22202.
E-mail: {gonzales, jkaplan, zwinkelm, dwoods}@rand.org.
� E. Saltzman is with the RAND Corporation, Arlington, VA
22202, and
The Wharton School, University of Pennsylvania, Philadelphia,
PA 19104.
E-mail: [email protected]
Manuscript received 8 Mar. 2014; revised 1 Nov. 2014;
accepted 5 Feb. 2015.
Date of publication 30 Mar. 2015; date of current version 6
Sept. 2017.
Recommended for acceptance by C. Rong.
For information on obtaining reprints of this article, please send
e-mail to:
[email protected], and reference the Digital Object Identifier
below.
Digital Object Identifier no. 10.1109/TCC.2015.2415794
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 5,
NO. 3, JULY-SEPTEMBER 2017 523
2168-7161 � 2015 IEEE. Translations and content mining are
permitted for academic research only. Personal use is also
permitted, but republication/redistribution
requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/i
ndex.html for more information.
CCS network monitoring, file access, and situation aware-
ness data to detect intrusions into a tenant’s cloud network,
and whether the tenant’s security and monitoring systems
contribute to the intrusion detection.
This paper is organized as follows. Section 2 discusses
trust zones (TZs). Section 3 presents a cloud reference model
and cloud security control features. Section 4 describes CCS
unique attack paths and vulnerabilities that can be exploited
by APTs. Section 5 describes Cloud-Trust. The final section
provides Cloud-Trust results for four alternative cloud archi-
tectures, and describes how Cloud-Trust can be used to
assess the security capabilities of alternative CSP offerings.
2 PHYSICAL AND VIRTUAL TRUST ZONES
We define a trust zone as a combination of network segmenta-
tion and identity and access management (IAM) controls.
These define physical, logical, or virtual boundaries around
network resources. Cloud TZs can be implemented using
physical devices, virtually using virtual firewall and switching
applications, or using both physical and virtual appliances.
IAM systems use usernames, passwords, and access
control lists (ACLs), and may use active directory domain
controllers [10], Federated Trusts [11], and multifactor
authentication mechanisms using time limited codes or
X.509 certificates. IAM servers can also use hardware infor -
mation to make access decisions. For example, devices with-
out a pre-validated MAC address can be prevented from
joining a network. Routers using ACLs and IP address white
listing can prevent an unauthorized device from accessing
network resources. These are examples of hardware based
TZ enforcement.
An example of a more complex network CCS segmenta-
tion scheme is shown in Fig. 1. It uses defense in depth
approach to restrict network connectivity to VMs running
in a CCS. Both real and virtual network interface cards
(NICs) are used to isolate network segments. The network
segmentation approach is based on the virtual networking
capabilities offered by VMware in their ESX HV [12]. It ena-
bles a hybrid strategy that uses both virtual network and
physical firewall barriers to protect information in TZs A
and B shown in the Fig. 1. Amazon web services (AWS)
offers a similar capability called virtual private cloud (VPC)
[13]. An APT attack with the goal of exfiltrating data at rest
on a resource in TZ B in Fig. 1 must first circumvent the
network segmentation and establish network access to the
target resource. By staging the attack from a trusted IP
address (whitelisted by the firewall(s) protecting that zone),
the attacker may gain network connectivity to the target.
Assuming the data at rest is encrypted and brute force
decryption is not feasible, the attacker must also gain access
to the credentials and keys required to decipher the data.
This access is typically governed by policies and accounts
on the domain controller. Access is granted for legitimate
requests from users that have been authenticated and who
are authorized. Successfully spoofing these requests, or oth-
erwise gaining access to the keys after access has been
granted to a legitimate user, would provide the attacker
with the ability to decrypt the data.
Compromising data from TZ B in Fig. 1 while it is in
flight presents different challenges. Data in flight may tran-
sit other segments of the network with lower barriers to
access for the attacker. For example, if a server in TZ A
retrieves data from TZ B, the data is now in this less pro-
tected zone, and may be diverted or copied and transmitted
over the Internet. If the data is in flight using a protocol that
does not guarantee end-to-end encryption such as SOAP,
and instead uses point-to-point transport level encryption
such as REST over HTTPS, the data will be decrypted at var -
ious points in transit, possibly in memory, before it reaches
the application layer at the destination endpoint. On the
other hand, relying on capturing data in flight makes it
much more difficult to compromise the entire dataset.
The security of TZ implementations depend on correctly
configuring domain controllers, firewalls, routers, and
switches that are used in segmenting and restricting access to
portions of the cloud network and on “locking down” secure
communications between users and domain controllers to
prevent SOAP interface or signature wrapping attacks [14].
Misconfiguration of IAM servers, domain controllers and
other network devices can introduce vulnerabilities in the
cloud network and let attackers enter restricted TZs. Careful
configuration management is a key factor that must be taken
into account in assessing cloud security status. To ensure
such vulnerabilities are not inadvertently created in a CCS
well trained system administrators (sys-admins) are needed
to set up, maintain, and correctly patch this infrastructure.
3 CCS REFERENCE MODEL AND ARCHITECTURES
This work is limited to one cloud deployment model, infra-
structure as a service (IaaS) clouds. The layers of the software
stack below the Guest OS are under the control of the IaaS CSP:
the virtual machine manager (VMM), HV, computing and stor-
age hardware, and the CCS network. Only the guest OS that
forms the foundation for VMs is assumed under the control of
cloud tenants. IaaS cloud tenants provide their own applica-
tions and data. The Guest OS may be specified by the CSP
policy, or control of the guest OS configuration may be shared
between the CSP and cloud tenant. Because of the shared con-
trol of the IaaS cloud software stack the security profile and
status of the CCS depends on both CSP and tenants.
The CCS reference model is shown in Fig. 2. CSP man-
agement and security servers are segregated from cloud
tenant VMs by subnets, firewalls, domain controllers, and
internet access points. Tenant VMs are networked using a
software defined network (SDN) shared by all cloud ten-
ants. A CSP domain controller controls access to virtual TZs
Fig. 1. CCS network segmentation scheme.
524 IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL.
5, NO. 3, JULY-SEPTEMBER 2017
used by cloud tenants. TZ gold, which contains more valu-
able Agency data, is housed within Agency TZ A. This pro-
vides multiple access control boundaries to prevent external
cloud users, for example from the tenant B TZ, from access-
ing data in the Gold TZ.
The CSP TZ is segregated from tenant TZs and contains
cloud management servers, SDN controller servers, CSP ten-
ant IAM servers, and CSP information system security sys-
tem (IS3) servers. CSP sys-admins communicate with CSP
management systems through a separate firewall and Inter-
net port to isolate CSP communications traffic. It is a best
practice to isolate CSP management and monitoring systems
from cloud tenant VMs, as illustrated in Fig. 2 [15]. Our
cloud reference model is based on this best practice and
design tenets developed by the Defense Information Sys-
tems Agency (DISA) for securing enterprise networks [16].
Early information systems were designed largely to man-
age computing resources, apportion costs, and improve
performance. As cyber threats grew, enterprise network
security capabilities grew in an attempt to keep pace with
the threat. Modern firewalls block IP ports and protocols
and inspect packets. They also include host-based intrusion
detection systems (IDSs), keystroke logging, reverse web
proxy servers, DMZs, IAM servers, security incident event
managers (SIEMs), and other more exotic detection and pro-
tection systems. Network performance monitoring tools,
such as Netflow, and log file analyzers are used to identify
suspect data flows or configuration changes, and automated
software distribution systems rapidly patch OS installations
and applications. Cyber security systems have been adapted
so they perform similar functions in CCSs, although virtual -
ization presents new challenges to both the attacker and
defender.
We call the cloud systems that detect and prevent the
actions of malware and bad actors the information system
security system. IS3 systems can generate lots of data and
have high false alarm rates. Well-trained sys-admin person-
nel are needed to monitor and manage IS3 servers. A cloud
IS3 includes IDSs, host based security systems, fire-walls,
IAM servers, reverse proxy web servers, syslog servers, and
SIEM servers (all capable of functioning effectively in a vir -
tual environment). The SIEM aggregates event data pro-
duced by security devices, network infrastructures, systems
and applications. Event data is combined with contextual
information about users, assets, threats and vulnerabilities.
The data is normalized, so events, data and contextual infor -
mation from disparate sources can be correlated and
analyzed for specific purposes, such as network security
event monitoring, user activity monitoring and compliance
reporting. Fig. 2 shows the location of IS3 servers used by
the CSP, the Agency, and other tenants. We assume tenants
provide their own IS3s to monitor and manage their TZs.
System protection and risk reduction involve numerous
actions not performed directly on the CCS. These include
physical protection measures, vetting employees, security
awareness training, maintaining a vulnerability manage-
ment data base, and participating in national vulnerability
organizations and fora (e.g., SANS). We do not include
employee training or vetting activities in Cloud-Trust, but
note they are important for securing CCSs and CSPs.
A wide range of options exist for configuring, segment-
ing, and applying security controls to a CCS. Many types of
security systems can be added. It is the beyond the scope of
this paper to enumerate all possible cloud security controls.
We focus on a few new promising CCS specific security
capabilities. An important security attribute is how CSP
sys-admins manage the CCS. We assume management is
performed off-site. As described above we assume CSP sys-
admins control CSP management servers using a dedicated
Internet portal. CSP sys-admin traffic is accepted by the
CSP control port firewall and routed to CSP management
servers only if the traffic originates from an approved list of
IP addresses. CSP management applications are isolated by
hosting them on dedicated servers in their own CCS subnet.
However, they cannot be completely isolated from tenant
VMs, as they must monitor tenant VMs. Fig. 2 shows routers
Fig. 2. CCS reference model.
GONZALES ET AL.: CLOUD-TRUST—A SECURITY
ASSESSMENT MODEL FOR INFRASTRUCTURE AS A
SERVICE (IAAS) CLOUDS 525
connecting tenant and CSP management subnets. These
subnets can be isolated in hardware by using separate NICs
for public and control plane (i.e., management) networking.
Table 1 shows four cloud architectures based on the ref-
erence model with progressively more security controls.
More robust security controls are shaded. All four architec-
tures use an SDN for tenant VM networking.
The first has a minimal set of security controls. The sec-
ond incorporates additional data center physical access, CSP
sys-admin authentication, and server hardware port con-
trols. In the first architecture any CSP employee can enter
the cloud data center. In the second, CSP sys-admins are not
permitted in the data center. Employees authorized to enter
the data center carry electronic access control cards and their
movements are tracked in the data center. CSP sys-admins
must use two factor authentication to login to CSP manage-
ment servers, and they must sign in as named local users
and not as root. Some cloud management products now
offer such capabilities [17], which make it easier to identify
unauthorized processes running with high privilege levels.
The third architecture includes the security controls of
the second one and applies these security controls to all
Agency sys-admin and regular users. Agency cloud users
must login to Agency VMs using time sensitive two factor
authentication methods.
The fourth architecture includes additional cloud infra-
structure hardening measures. VM images are encrypted in
storage. VM image store directories are monitored for access
attempts, image changes, and TZs are isolated using more
robust measures.
The HV and (basic input/output system (BIOS) used in
the CCS present potential additional points of vulnerability.
HVs contain source code also found in an OS and may have
large code bases, which means they may contain significant
vulnerabilities. New technologies have have been developed
to protect HVs and BIOS and to detect unauthorized HV or
BIOS tampering. NIST has developed guidance for harden-
ing BIOS [18]. Server vendors and microprocessor manufac-
turers now provide capabilities to verify CPU authenticity,
the unaltered state of key chips on the motherboard, and
which can securely measure and store BIOS and software
boot time information. These make use of the Trusted Plat-
form module (TPM) [19]. TPM has been integrated with the
boot time measurement and remote attestation capabilities
of Intel and other microprocessors [20]. There are many
options to consider in this area. A particular CSP may imple-
ment a commercial HV that utilizes all of the security capa-
bilities offered by TPM. Or the CSP may choose to not
implement any of the security options available for a partic-
ular HV, microprocessor, or server. Or the CSP may use a
custom designed HV, with its own unique security features.
In this case the complete set of HV and server security fea-
tures may not be public information. For the sake of illustra-
tion we consider only two options in this area. In cloud
architectures 1 to 3 we assume a non-signed HV and servers
and CPUs without TPM are used. In these cloud architec-
tures, the integrity of the BIOS and HV cannot be verified
during boot up.
Cloud architecture 4 is more secure. All servers in the
CCS are assumed to use trusted BIOS (signed BIOS), TPM,
and CPUs capable of making secure boot time mea-
surements, such as Intel Trusted Execution Technology
equipped CPUs [20]. Some HVs, such as VMware’s vSphere
5.1 and later, are available in modular form, with each mod-
ule containing a PKI signature that can be independently
used to verify boot time and the unmodified state of the
software code base during boot up. In the future, protected
memory CPUs may have TPM capabilities built into the
microprocessor, and may be used to verify the unmodified
state of the HV code base dynamically at periodic stages at
runtime [21], [22].
Table 1 shows other security attributes of the CCS archi -
tectures we consider. One is the degree of isolation of tenant
TZs. An important aspect of this isolation is whether cloud
users in other TZs can surveil the public portions or private
tenant subnets in the cloud beyond their own subnet or TZ.
If tenant VM names and IP addresses are readily available
within the cloud, a cloud user from outside the Agency may
be able to use standard network surveillance tools to iden-
tify the names and IP addresses of VMs used by Agency
TABLE 1
CCS Architecture Security Controls
VM Images
At Rest
VM Migration CSP Sys-admin
IAM
Data Center physical
security
Hypervisor,
BIOS, CPU
VM Isolation Tenant IAM App.
White-listing
Cloud
Arch 1
Not encrypted Unencrypted
memory pages
and packets
Single factor All CSP employees
have access
HV, BIOS not
signed
No network,
CPU isolation
Single factor No
CPU without
TPM
Cloud
Arch 2
Not encrypted Unencrypted
memory pages
and packets
2 factor—time
limited token
code
CSP employee access
limited & controlled
þ USB server ports
disabled
HV, BIOS not
signed
No network,
CPU isolation
Single factor No
CPU without
TPM
Cloud
Arch 3
Not encrypted Unencrypted
memory pages
and packets
2 factor—time
limited token
code
CSP employee access
limited & controlledþ
USB server ports
disabled
HV, BIOS not
signed
No network,
CPU isolation
2 factor—time
limited token
No
CPU without
TPM
Cloud
Arch 4
Encrypted at
rest þ file
access moni-
toring
Encrypted
memory pages
and packets
2 factor—time
limited token
code
CSP employee access
limited & controlledþ
USB server ports
disabled
Signed HV,
signed BIOS
CPU with TPM
Virtual PANs,
temporal CPU
isolation
2 factor—time
limited token
Yes
526 IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL.
5, NO. 3, JULY-SEPTEMBER 2017
users (as may be possible in the Amazon web services cloud
if certain security controls are not implemented by the ten-
ant [5]). These capabilities have significant security implica-
tions, as shown by Ristenpart [5]. A wide range of network
configurations is relevant to this security dimension. To
make the analysis tractable we consider only two options in
this area. The first is when cloud tenants have a wide range
of surveillance capabilities at their disposal. The second is
when the cloud tenant is not able to conduct surveillance
operations across tenant TZs. The second option is adopted
only in the fourth cloud architecture. It can be implemente d
in a variety of ways. One is by using dedicated hardware,
perimeter firewalls, and IDSs to protect the Agency TZs, as
is the best practice for securing enterprise networks [16].
However, this reduces cloud flexibility and elasticity. New
cloud security technologies, like virtual firewalls and virtual
networking using encrypted packets provide similar capa-
bilities in a fully virtualized environment. AWS offers a EC2
service called virtual private cloud with these capabilities
[13]. VMware offers networking and security capabilities in
a product called VxLan [23] to support the isolation of VMs
and VM TZs, and has recently received a patent on such
capabilities [24].
VMs in storage and migration also require protection
[25], [26]. If the VM image is altered in storage and compro-
mised by malware, an adversary may gain control of the
VM even if it is spun up in a highly protected TZ. If an
adversary can gain access to a VM when it is stored in mem-
ory during migration or to the VM packet stream when the
VM is moved, the adversary can obtain crypto keys or other
credentials that provide access to sensitive data and applica -
tions in the agency TZ [27]. VM images can be encrypted to
prevent VM image inspection and compromise. Live VMs
could also be protected during migration by encrypting
them in memory and during their movement by encrypting
VM IP packets. These security controls are part of the fourth
cloud architecture, as indicated in Table 1.
4 CCS NODE CLASSES
The abstracted view of an IaaS CCS is shown in Fig. 3. It is
the starting point for Cloud-Trust, and is based on the types
of nodes in a CCS. These are labeled node classes, because
many individual nodes of each type or class will be present
in the CCS.
To simplify the analysis we assume all nodes in each
node class are identical in terms of their security properties
(before any malware is introduced we assume they are iden-
tically configured and that if there are system or node con-
figuration errors these are common across all nodes in a
node class). Therefore, it is not essential to distinguish
between individual elements in each node class, and we can
define a Bayesian network model in which the nodes of the
network are CCS node classes, and not individual system
components of the CCS. This Bayesian network model
forms the basis of Cloud-Trust.
The columns in Fig. 3 indicate the TZs node classes
belong to. The types of nodes classes are indicated in the
first column. Node classes reflect the segregation of CSP
and tenant network paths. The CCS architecture shown in
Fig. 3 also has the feature that VM traffic within a TZ can be
confined in that zone and segregated if all intra-TZ message
traffic is routed by the V routers. This functionality is consis -
tent with SDN or virtual networking capabilities provided
by leading HV vendors and CSPs.
The attacker’s objective is assumed to be the data store in
TZ Gold in the upper left hand corner of Fig. 3. The APT
will have to traverse the network of node class objects from
bottom to top to gain such access if the attack starts from
outside the cloud.
Using such node class diagrams, a cyber attack against an
IaaS cloud can be represented by a directed graph of edges
and nodes. The types node classes included in the node class
diagram depend on the specifics of the cloud architecture
examined. To find the set of edges that represent technically
feasible cyber attacks we investigate specific CCS vulner -
abilities identified in the literature. These are used to
develop a set of attack paths that span the set of all feasible
paths through the CCS infrastructure to the APT target.
5 CCS ATTACK PATHS
CCS attacks can be divided into outsider or insider attacks.
Outsiders can gain access to the cloud using three attack
paths. The first exploits weaknesses in cloud access control
mechanisms. Such weaknesses may exist in firewalls or
IAM servers used by the CSP or cloud tenants. The second
starts by stealing valid credentials of a cloud user at some
location outside the cloud (for example from a host inside a
government agency). The third outsider attack path starts
with the attacker using valid credentials and prior legiti -
mate access to the cloud.
Insider attack paths start inside the cloud when the
attacker already exploits credentials for at least one cloud
TZ, for example the CSP TZ. The ingress attack paths we
consider are shown in Table 2.
The attack paths are defined in two variants. The first we
call a “Stuxnet” variant where the APT requires little or no
command and control (C2) by the external human attacker.
In this case the APT has the surveillance information it needs
to conduct all stages of the attack, or capabilities needed to
independently do surveillance. The second attack variant is
one where the APT has much less capability and information
about the CCS environment. In this case we assume it must
communicate with an external control authority and be
updated with new capabilities during the attack.
Fig. 3. CCS node classes.
GONZALES ET AL.: CLOUD-TRUST—A SECURITY
ASSESSMENT MODEL FOR INFRASTRUCTURE AS A
SERVICE (IAAS) CLOUDS 527
The target data that the APT attempts to access in all
these attacks is located in a cloud TZ controlled by a govern-
ment Agency—TZ Gold (G). We assume Agency users with
TZ G access are also able to log into VMs in the Agency’s
TZ A. We do not assume that Agency network traffic is not
restricted between A and G TZs. We also assume that
Agency VMs operating in the same TZ run on the same
physical machines and HVs.
5.1 VM CPU Timing Side Channel Attack
This attack is based on VM vulnerabilities identified by
Ristenpart, et al. [5]. It is representative of a class of attacks
that take advantage of VM co-residency, which arises when
VMs of two or more users share the same hardware. If the
attacker’s VM is co-resident with the target VM it may be
able to glean information from the target VM by observing
the hardware’s behavior.
First the APT obtains access to the cloud and conducts
surveillance. If the target is in a public cloud the only barrier
to entry is a valid credit card to establish an account. The
attacker instantiates VMs as needed to collect information
on servers and VMs. To surveill the cloud the attacker will
run legitimate code or malware.
We define VMs as being co-resident when they operate
within the same physical machine and same HV. A variety
of techniques can be used to detect and establish co-resi-
dency [5].
If the tenant is not guaranteed exclusive use of hardware,
the instantiation of a VM that is co-resident with a target
VM is generally governed by chance. However, it may still
be possible using techniques described by Ristenpart [5]
called “Cloud Cartography.” Other co-residency checks use
network trace routes. Since the first network “hop” from a
VM is its HV, if that HV is configured to report itself when a
trace route is conducted, co-residency can be detected using
IP addresses. In a similar way, “distance” can be deter -
mined by ping packet round trip times. The lower the round
trip time, the more likely the VMs are co-resident [5].
If the VM operates an external facing service such as a
website, still other load analysis techniques may be feasible
estimate co-residency [5].
Once co-residency is achieved, the attacker uses a prime-
trigger-probe technique to monitor activity on the shared
CPU’s cache. The attacker’s goal is to obtain an agency
user’s password, which may be done by analyzing an
agency user’s inter-keystroke timings [5], [29].
Once credentials have obtained, they are used to directly
logon to the target’s VMs. Once inside the agency network,
additional surveillance may be conducted to identify and
gain access to the targeted Gold data.
5.2 Software Defined Networking Attack
This attack exploits potential vulnerabilities in SDNs [30].
Virtual switches are special purpose VMs that may be co-
resident with guest VMs on the same HV. Other configura-
tions are possible including one where the virtual switch
logic and code are integrated with the HV.
First, the APT gains access to VMs in a cloud TZ (e.g., TZ
B) that are logical and network “peers” to the target VMs.
This can be done through legitimate means if the only bar-
rier to obtaining a CSP account is payment.
With legitimate or stolen credentials, the APT gains regu-
lar user access to a TZ B VM. The APT installs malware on
the TZ B VM, which enables the APT to control the HV
(exploiting a HV vulnerability). Once the HV has been com-
promised, the APT is able collect information from the host
machine’s RAM such as additional credentials, network
architecture, and decryption keys to compromise additional
VMs and physical machines as necessary. We assume that
credentials obtained for one VM in a TZ can be used on
other VMs in the same TZ.
The APT obtains credentials to logon to a VM on the
machine hosting the VM with access to Gold data. The APT
compromises the HV on this machine. This time, the APT
uses malware to modify the behavior of the virtual switch.
This could include changes to the code in the virtual switch,
the routing table, or both, so network packets destined for
or emanating from the target (gold TZ) VM are copied and
directed to a VM under APT control. Encryption of network
traffic within the agency’s virtual enclave could deter such
an attack.
The APT obtains the targeted information over time by
filtering the inbound and outbound network traffic to the
target VM. The CSP design pattern that makes this attack
possible is putting SDN based VMs co-resident in the same
physical machines with cloud tenant VMs.
5.3 VM Attack through the HV
This attack starts in much the same way as the SDN attack
above. The APT obtains valid government user credentials
(through spearfishing, surveillance, or use of malware) that
can be used to access a VM operating in the agency’s TZ in
the cloud. A related attack path exists in the public cloud.
Then the attacker obtains a public cloud account and ini -
tiates VMs in TZ B with the objective of compromising the
HV and obtaining co-residency with a target agency VM
running in TZ A or TZ G.
HV compromise proceeds as in the SDN attack. The APT
installs malware that exploits a vulnerability in the HV
that enables privilege level escalation [31], [32]. Once the
HV is compromised, the APT collects data from the host
machine’s RAM such as additional credentials, network
architecture, and decryption keys to compromise additional
VMs and physical machines as necessary. This data is used
to locate target VMs and to obtain co-residency.
TABLE 2
Cloud Specific Attack Ingress Paths
Attack Name Key Node Classes Exploited
VM side channel attack Physical machine
SDN virtual router Hypervisor, virtual router
VM attack through the hypervisor Hypervisor
Live VM attack VM
Corrupting VM images 1 VM image and VMs
Disk injection to Live VM VM
VM migration attack 1 Local storage
VM migration attack 2 V-router
VMM control compromise 1 VMM, V-router
VMM control compromise 2 VMM, hypervisor
CSP sys admin þ physical access Physical machine, VM
Corrupting VM images 2 VMs and VM images
Undetected config. modification CSP firewalls, IAM servers
Nested Virtualization Hypervisor
528 IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL.
5, NO. 3, JULY-SEPTEMBER 2017
Once the attacker has successfully executed the above
steps and becomes co-resident with the target VM, the APT
can extract relevant data from the memory of an operating
VM in the Gold TZ and can gain access to Gold data.
5.4 Live VM Attack
In this attack we assume each VM has at least one “local”
active administrator account. For this is a local username-
password account the VM doesn’t seek network validation
of the logon. The hashed user name and password—that is
targeted by the APT.
We also assume all VMs in agency TZ have the same
local sys-admin logon accounts. The success of this attack
and variations on it are dependent primarily on the
agency’s configuration of its VMs.
First, the attacker illicitly obtains agency credentials from
outside the cloud to gain regular user access to a VM in the
Agency’s TZ A. With these credentials, the APT gains regu-
lar user access to an agency VM in TZ A. Depending on the
tenant’s security configuration, the APT may need to work
around additional hurdles such as access via a restricted
range of IP addresses (i.e., IP white listing restrictions). We
assume for this attack that these additional security controls
are not in place.
The APT installs malware to extract the file containing
the hashed local sys-admin password (such malware
would require some form of malicious privilege escala-
tion). The APT moves the hashed password file to a loca-
tion under its control where it decrypts the password file.
Using this local sys-admin password, the APT logs into
additional TZ A VMs and installs a key logger to collect
additional credentials. The APT repeats this combination
of local sys-admin password and key logger exploits until
eventually, the APT obtains credentials sufficient to gain
access to a VM running in the Gold TZ that has access to
gold data.
5.5 Corrupting VM Images 1
In this attack VM images are compromised and used to gain
access to agency Gold data [33]. We assume agency refer-
ence VM images are stored in the cloud. The success of this
attack is dependent on the VM image storage controls used
by the CSP and agency. For this attack to be effective VM
images images would not be encrypted, no file access moni -
toring used, and only single factor authentication would be
available to tenants.
First, the attacker uses valid (insider) or stolen (outsider)
credentials to access the agency’s image store in CCS. These
credentials are assumed to grant the intruder access to TZ A
and to a shared storage directory accessible by the CSP and
agency users with TZ A access credentials. Agency VM
images are stored in this shared storage directory. The out-
side attacker uses stolen credentials to access and copy one
or more agency VM images. The insider would be a CSP sys
admin or an Agency sys admin who has access to the shared
VM image store.
The attacker modifies the VM image to include malware
that monitors data accessed by VM. The attacker uses the
same agency credentials to insert the modified VM image
into the image store. Agency personnel use the infected VM
image to instantiate new VMs. The malware on infected
images remains dormant for a period of time to avoid trig-
gering startup timing alarms.
Malware on the VM monitors the data accessed by the
VM user. When the Gold data is accessed, the APT uses
additional exploits on the target VM to access Gold data.
This may involve caching credentials to allow the APT to
directly access the VM or to deposit Gold data in local stor-
age using previously stolen credentials.
5.6 Disk Injection to Live VM
The attacker attempts to gain access to agency Gold data by
placing malicious code in the local attached storage of the
targeted VM [34]. Necessary pre-conditions for this attack
are that the VM in TZ Gold is operating on a physical
machine that hosts VMs in other TZs, and the attacker can
conduct network surveillance inside the cloud. The APT
can then attempt co-residency with the target.
Using similar surveillance, pivoting, and compromise
steps associated with earlier attacks, the APT gains access to
a VM that is co-resident with a target VM operated by the
Agency in its gold TZ.
In this attack, after the APT logons to a VM co-resident
with the target VM, the APT exploits a vulnerability in the
HV to compromise it.
Using the compromised HV, the APT writes malicious
code to the local storage of the target VM. The HV also
makes a minor change to the native “root/admin” level job
scheduling system of the OS that ensures the malicious
code will be called. When the privileged (root/admin level)
job is called on the target VM, the malicious code is loaded
and run. The malware then beacons its readiness to take fur -
ther action by communicating to the APT’s human control-
ler. The APT is directed by the attacker to access Agency
Gold data.
This attack becomes much more difficult if the local stor-
age of the VM is encrypted. In such case, both the encryp-
tion regime and the HV must be compromised in order to
complete the attack.
5.7 VM Migration Attack
VMs are migrated or moved frequently in clouds to prevent
the overheating of servers and to optimally allocate work-
loads to available physical machines and resources. During
workload migration VM memory pages including the OS
are copied and moved to a new location. This attack takes
advantage of the exposure of a VM during VM migration
operations in the cloud [27].
Through spearfishing and surveillance, the APT obtains
user credentials for a VM operating in cloud tenant B TZ.
Using a VM in TZ B the APT monitors network traffic
(without additional compromises, this presumes that the
VM is receiving and can control the behavior of its virtual
or physical NIC to put it into promiscuous mode so that it
can capture packets not addressed to it). APT uses VMs in
TZ B to capture and filter network traffic.
When a live VM transfer is detected, the attacker’s VM
stores the associated packets. Useful information is extracted
from the captured VM (certificates, credentials, file access
information) and is used to compromise additional VMs in
other TZs, until the attacker compromises a VM in TZ Gold.
At this point the attacker gains access to Agency Gold data.
GONZALES ET AL.: CLOUD-TRUST—A SECURITY
ASSESSMENT MODEL FOR INFRASTRUCTURE AS A
SERVICE (IAAS) CLOUDS 529
5.8 CSP Personnel with Physical Access
CSP personnel with physical access to the CSP datacenter
can breach security controls by direct access to physical
machines. However, the large number of machines compli-
cates the task. Precision requires the attacker first identify
the hardware hosting the target data.
The CSP insider cannot make physical contact with every
machine in the datacenter, but he has several methods to
locate the machine hosting the agency TZ G VMs. The first
is to enumerate all of the Agency’s live VMs. CSP manage-
ment servers hold such data. A CSP sys-admin will have
access to this data.
The list of agency VMs might be very large. The attacker
must reduce the list so he can visit each machine. Informa-
tion that can help narrow the list is configuration data. This
includes security group and other tenant created configura-
tions that reveal the topology of the tenants resources in the
cloud, specific services that can be assumed based on spe-
cific ports that are open, identity and access management
data that shows which tenant users have CSP accounts and
what they are allowed to do with specific resources, tenant
naming conventions for their machine images or instances,
and relative memory, disk, CPU, and I/O sizing of various
instances. These steps are likely to identify, for example,
large machines, which host web server, file share, or data-
base processes, and those that have limited access.
Once the CSP insider knows which machines to visit, he
must map these to the datacenter layout. Datacenters that
are segmented or compartmentalized, or keep access to
physical and logical maps separate, will complicate the
task. In contrast, datacenters that have a single point of
entry will make this attack easier.
A CSP insider can inject malware using a USB drive. USB
ports on physical machines are a well-known vector for
inserting malware and ex-filtrating data. These attacks can
be instrumented to work in an environment where the user
is unprivileged and possibly unaware of the payload.
To compromise the target the attacker must induce it to
load the malware. Physical machines with protections
against ‘autorun’ execution may require additional manipu-
lation via a KVM management interface. Such access may
require access tokens that would identify the insider, but
this depends on how such tokens, including local machine
administrator account passwords, are managed. Given the
familiarity a CSP insider is likely to have with the software,
hardware, and virtualization stack, they may have the
option of employing minimally invasive, and therefore
hard to detect malware such as an in memory rootkit. Such
malware will not be directly detected by disk or network
based scans.
The malware injected via physical access provides a
breach point for the attacker. The breach itself can provide
network access and elevated privileges on the HV hosting
the target VM. By beaconing to known attacker control
nodes, the attacker can establish a link to control the execu-
tion of the rest of the attack.
5.9 VM Manager (VMM) Control Compromise
CSP sys-admins use VMM capabilities to migrate live VMs,
to allow for hardware servicing without execution interrup-
tion, or to debug faults using core dumps and memory page
snapshots. An attacker can repurpose VMM utilities to com-
promise agency data.
VMMs can be a privileged VM that runs on top of the
HV. The VMM has access to ring 0 privileges and can see
other VM’s memory and configuration values. If the
attacker gains direct access to the VMM, or is able to corrupt
the VMM control channel, they would gain a great deal of
maneuverability within cloud infrastructure.
Compromising the VMM or VMM control provides the
attacker with a path to Agency Gold data by making keys
and other sensitive data in an Agency VM visible to the
attacker [35]. It also provides the attacker with a mechanism
to move resources across TZs, for example by moving mem-
ory dumps, machine state, or entire VM instances from one
physical machine to another. For example, the attacker
could use the VMM to take a memory snapshot of an
Agency VM in TZ Gold. The attacker could then proceed to
access sensitive access tokens or data.
This attack has three key steps: identifying the HV host-
ing the target, gaining access to the VMM control channel,
and executing a snapshot or memory dump request from
the VMM.
One path for this attack begins from a compromised
node or insider in the CSP enclave. This person, or node
would allow the attacker to identify the HV that contained
the target VM. Identifying the HV implies identification of
the VMM. Other outsider attack paths also exist.
Once the target VMM is identified, the attacker acquires
the ability to send it valid requests. If the physical machine
has a separate network interface card installed to isolate
command channel traffic to the VMM, the attacker may
need to compromise a CSP enclave node with access to
that network. Or a CSP insider with access to a CSP man-
agement enclave C2 node can do this if the CSP insider
has sys admin privileges.
If VMM traffic transits the same NIC as all other traffic to
and from the HV, an outside attacker may be able to gain
access to and control the VMM from C2 nodes outside of
the CSP management enclave. In order for this attack path
to be successful the attacker will have to compromise one or
more nodes in the cloud network that are in the network
path between the target and the CSP management servers
in the CSP TZ.
If management function requests are run using a protocol
that does not require authentication, network access to the
control channel gained in the previous step might be the only
requirement for successfully dumping the memory of the tar-
get VM. Otherwise, a credential may need to be compro-
mised. If this is the case, the insider or compromised node in
the CSP enclave could be used to surveil the host and network
for valid credentials. The attacker establishes a destination
for the memory dump, presumably outside the Agency’s TZ.
The attacker sends a message to the VMM managing the
target VM instructing it to dump its memory into a location
in TZ B. The attacker examines the memory dump and iden-
tifies needed credentials to access agency Gold data, or finds
the Gold data directly in memory.
5.10 Corrupting Agency VM Images 2
VM images and instances are vulnerable to attacks from
the time they are created, during their transfer to the CSP,
530 IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL.
5, NO. 3, JULY-SEPTEMBER 2017
in storage in the cloud, while running, and when they are
migrated within the cloud. Any unauthorized access or
manipulation of VM image file can undermine trust in it.
Infecting images can be more damaging than ‘stealing’
them because instances based on the infected image will
continue to process sensitive data and may expose it to fur-
ther exploitation. Integrity checks that are both stringent
and regularly performed can provide some assurance
regarding the health of the image, but such checks can be
defeated.
Modifying a startup script in a VM image provides a sim-
ple example of how an attacker can gain control of a VM.
Adding just a few commands can open a backdoor (i.e.,
exploit a vulnerability in the OS) or send a beacon signal to
the attacker’s command and control infrastructure. The
attacker can then connect to the VM and continue to the
next phases in the attack. Because the attack is inserted into
the startup routine, it will run every time a VM instance
based on infected image is spun up. VM instances are also
susceptible to manipulation.
Implementing this attack requires three steps: gaining
access to the CCS, modifying images or instances while
avoiding integrity check violations, and creating a beacon
that indicates successful compromise of a live VM.
Attacks that exploit vulnerabilities of networked devices
may also apply to CSP management servers. An APT could
use spearfishing, surveillance, and installation of malware
to gain access to a physical machine and sys-admin account
credentials in the CSP enclave providing them with a com-
mand and control (C2) node and network access to cloud
management servers in the cloud that host dormant VM
images and instances.
From the C2 node, the CSP enclave can be surveilled for
the target: physical machines hosting the agency VM
images and instances can be infected. Once found, the C2
node can be used to access the target and establish the abil -
ity to read and write from the VM images and instances. At
this point a second APT package can be injected into the
agency VM image or instance. The C2 node can also be
used to access and manipulate or defeat the aforemen-
tioned integrity checks by replacing hash values, or causing
hash collisions.
When an authorized agency user requests the VM image
or instance be spun up, integrity checks are circumvented
and the modified startup scripts are run activating backdoor
and beaconing malware. The activation of the beacon and
backdoor can be scheduled to run at a later time or made to
run so quickly such that the deviation from a baseline
startup time may not be noticeable.
The attacker can use the backdoor on the infected VM to
install additional malware if required. The attacker waits
for a compromised VM to be started by an authorized user
with TZ Gold credentials. When this occurs the attacker has
network access and elevated privileges on the target VM to
access Agency Gold data.
This attack can be defeated by encrypting Agency VM
images stored in the CCS and ensuring cryptographic keys
are controlled by the Agency and not the CSP. There are a
number of ways of implementing a secure key managment
system for CSPs. One approach has been developed by
Tysowski and Hasan [46].
5.11 Undetected Configuration Modification
Restricting traffic to a single whitelisted IP address associate
with an agency enclave is a common baseline security con-
trol-best practice for limiting access to resources provi -
sioned in the cloud. This, in theory limits access to the cloud
resources to traffic emanating from the agency enclave, but
it does not extend all agency enclave protections and moni -
toring to agency resources in the cloud (for example, an IDS
may be absent in the cloud, and the CSP SIEM may not
receive data from firewalls protecting Agency TZs). There-
fore, the agency has less situational awareness regarding
activity on its cloud based resources than it does within its
enclave. This may allow the attacker to obtain access to sen-
sitive data in the cloud.
Typically the CSP will provide an implementation of this
control to agency users. For example: defining security
groups for particular VMs. Permissions to create, modify
and remove these configurations are granted to agency
users with CSP accounts according to agency provisioning
using the CSP’s IAM schema. For example: agency user A is
allowed to create VMs and set security groups, agency user
B is allowed to start and stop instances but cannot create
them or modify their configurations. In order to modify the
security group configuration and whitelist IP address corre-
sponding to its C2 nodes, the attacker need only gain access
to the CSP credentials for agency user A.
Whitelisting an additional IP address for an APT C2 node
outside the agency’s enclave allows the attacker to user the
credentials it has acquired from inside the agency’s enclave
to access the agencies resources in the cloud without any of
the agencies monitoring tools detecting the access. If the
CSP does not notify the agency that a configuration change
has been made, and the attacker restores the original config-
uration after the access is complete, the agency may never
learn of the access.
This attack has three steps: obtaining credentials for
agency CSP resource configuration modifications and for
agency A and G TZ access; modification of agency CSP
resource configurations to white list the IP address of the
attacker’s C2 node; and access of agency Gold data from the
newly whitelisted enclave.
The attack begins by compromising a node within the
agency’s enclave via spear phishing or other methods. This
node allows the attacker to perform surveillance that subse-
quently yields a valid credential being used by agency users
to access a resource on an agency VM in the gold TZ, as
well as a valid credential for an agency user with the author -
ity to modify configuration of agency CSP resources.
Once the attacker has an agency user’s credential for modi-
fying configurations it may be able to use this credential from
nearly anywhere because this access may not confined to
whitelisted IP addresses. Once it logs into the CSP manage-
ment interface and adds an additional IP address to the
agency’s Gold VM whitelist this task is complete. An addi-
tional step to cover its tracks after the attack is complete might
involve reverting the configuration to its original setting.
Armed with the VM access credential obtained in the
first step, and a network path from its C2 node outside the
agency’s enclave, the attacker can proceed with essentially
unmonitored access to the agency’s VM using legitimate
credentials.
GONZALES ET AL.: CLOUD-TRUST—A SECURITY
ASSESSMENT MODEL FOR INFRASTRUCTURE AS A
SERVICE (IAAS) CLOUDS 531
5.12 Nested Virtualization
A nested virtualization attack [36] uses an additional unau-
thorized HV to access sensitive data and credentials. The
additional HV could be inserted either between the normal
HV and the physical hardware, or between a guest OS and
the normal HV. In the former case, the additional HV will
provide an attack surface that spans all of the VMs on the
original HV. In the later case, the additional HV could be
confined to a specific guest OS.
The target for the attack is a VM running in TZ G or is a
VM image with stored TZ G credentials that is at rest. Find-
ing the VM image at rest, or finding the physical machine
that the target VM is or will be spun up would be accom-
plished by surveillance of Agency VM operations. Either
target is likely to begin with the attacker gaining access to
the CSP management enclave in order to perform sufficient
surveillance. An insider working for the CSP can do the
surveillance.
Attacking the VM image and inserting the unauthorized
HV provides the advantage that the operation can be per-
formed before the image is loaded into the CSP infrastruc-
ture (while it is still in the agency enclave).
Targeting the image at rest, the attacker would ‘wrap’ it
with an additional HV (which would boot up first). Targeting
the physical machine would require that the attacker either
be able to reboot the machine and cause it to load the
attacker’s HV first, and then load the CSP’s HV, or implement
a ‘blue pill’ rerouting of a live HV without rebooting [36].
Once an attacker has successfully nested a HV at either
layer, one of the main advantages, in addition to gaining
access to memory and other sensitive resources, is that the
rest of the stack would function ‘normally’. The guest VMs
continue to run on virtualized infrastructure, and the origi -
nal HV thinks it is running on CSP hardware.
Once the attacker has succeeded in injecting a HV that it
controls, it has gained a stealthy point of access to sensitive
VM data and credentials. However, unless the attack is
completely autonomous, it may require additional surveil -
lance and C2 activities. The HV may therefore have to bea-
con to another node to complete the attack.
Nested virtualization attacks exploit the fact that both the
intended hosts and guests might not have mechanisms
available to verify the other parties. The guests are sup-
posed to run on a virtualized platform and may not be able
to detect that they are not running directly on a CSP sanc-
tioned HV. Similarly, both the CSP HV and the CSP hard-
ware provide interfaces that do not discriminate between
consumers of their resources. Absent specific restrictions,
an additional attacker controlled HV could be a consumer
that is as accepted as a guest OS, or CSP controlled HV.
6 BAYESIAN NETWORK MODEL
We apply Bayesian network statistics to the attack paths
described above. Attack paths have been used to under-
stand the vulnerability status of information systems [37].
They have also been used to develop probabilistic measures
of enterprise network security [38], [39]. We extend this
approach to CCSs by constructing an acyclic directed graph
using the attack paths defined above [40]. We apply these
attack paths to the CCS node classes defined in Fig. 3. The
resulting directed graph is shown in Fig. 4.
Cloud-Trust relies on conditional probabilities that repre-
sent the probability that a vulnerability in an individual
CCS component can be exploited by an APT, if other CCS
components have already been compromised.
These conditional probabilities correspond to the
directed edges shown in Fig. 4. This approach enables us
to factor in the contributions that specific CCS security
features can have in reducing the vulnerabilities of nodes
in the CCS and which then can contribute to a reduction in
the overall security profile of an IaaS cloud. Our model of
CCS architectures includes the security features and con-
trols the CSP provides, what the CSP permits the customer
or cloud tenant to provide, and what the cloud tenant actu-
ally provides.
The complete security model consists of two Bayesian
sub-networks: an infiltration sub-network and an exfiltra-
tion sub-network. Only the Cloud-Trust infiltration sub-net-
work is shown in Fig. 4. The infiltration sub-network
characterizes the probability that an APT will be able to
access the gold data, while the exfiltration network charac-
terizes the likelihood that the APT can exfiltrate the
accessed gold data. We assume the two sub-networks are
independent, i.e., the infiltration strategy is independent of
the exfiltration strategy employed by the attacker (In a sub-
sequent paper we will examine the relationships of infiltra-
tion and exfiltration strategies and will extend Cloud-Trust
to exfiltration networks).
We denote the infiltration Bayesian network BIN ¼ GIN;
�
Q
INÞ, where GIN is a directed acyclic graph with nodes that
are random variables and links that are direct dependencies
between those random variables. Let V IN ¼ Aif gni¼1 be the
sequence of random variables representing the nodes of
V IN such that binary random variable Ai denotes whether
node i 2 1; . . . ; nf g has been accessed by an APT to infiltrate
the gold data. Furthermore, defining aij ¼ Pr AijAj
� �
as the
probability that node i is accessed by the APT given that
nodej is accessed by the APT, we can define the link set as
Fig. 4. IaaS CCS infiltration Bayesian sub-network.
532 IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL.
5, NO. 3, JULY-SEPTEMBER 2017
LIN ¼ fði; jÞ : aij > 0; i; j 2 1; . . . ; n; i 6¼ jg. Observe that the
link set LIN gives the nodes between which an APT can tra-
verse with positive probability. Since GIN is a directed
graph, we must have that aij 6¼ aji. A consequence of the
acyclic property is that either aij ¼ 0 or aji ¼ 0. The compo-
nent QIN represents the set of quantitative parameters in
the network; for each parameter ui 2 QIN for i ¼ 1; . . . ; n,
we have that ui ¼ PrðAijpiÞ, where pi ¼ fAj : aij > 0g. In
other words, the set pi is the set of parents of node i or the
set of nodes from which an APT can access node i with posi -
tive probability. Note that we will make the Markov
assumption that the random variable Ai depends only on its
parents pi, i.e., the access of a node i depends only on which
node j it was accessed by the APT and not the history of
how the APT accessed node j.
While the above exposition characterizes the (unop-
posed) attack carried out by the APT, the SIEM has an
opportunity to detect the APT’s attack. Hence, we define
the binary random variable DINi indicating whether the
SIEM detects an APT access of node class i ¼ 1; . . . ; n indi -
cating whether the SIEM detects an APT exfiltrating data
through node class i ¼ 1; . . . ; n. If we let A denote the event
that the gold data has been accessed by the APT and unde-
tected by the SIEM, we can calculate the probability of
undetected access as
PrðAÞ ¼ 1 �
Yn
i¼1
1 � PrðAjAiÞ � PrðAiÞ �
�
1 � Pr DINi
� ��� �
;
where the probability that node class i has been accessed is
given by
Pr Aið Þ ¼ 1 �
Yn
j¼1;i 6¼j
1 � Pr AijAj
� �
Pr Aj
� �� �
¼ 1 �
Yn
j¼1;i 6¼j
1 � aij � Pr Aj
� �� �
for i ¼ 1; . . . ; n. We assume that Pr A1ð Þ ¼ 1, i.e., the APT
accessing the enclave node class is taken as given. Hence,
we have a system of n equations and n unknowns , i.e.,
Pr A2ð Þ; . . . ; Pr Anð Þ; PrðAÞ. Since the Bayesian network is
acyclic, solving this system is algebraically simple using
substitution.
Our model can also estimate the probability that the
SIEM and associated IS3 systems will detect an attack that
would infiltrate the gold data. Let DIN be a binary random
variable indicating whether the SIEM detect an attack that
would infiltrate the gold data. Then
Pr DIN
� �
¼ Pr A j nodetectionð Þ � PrðAÞ
PrðAÞ ;
where PrðAjno detectionÞ is the probability that the APT can
infiltrate the gold data without any detection (i.e., Pr DINi
� �
¼ 0
for i ¼ 1; . . . ; n. The above equation shows what percentage
of attacks that would otherwise be successful in infiltrating
the gold data can be detected.
Although mathematically simple, our Bayesian network
approach imposes constraints on how APT attacks can be
represented. We have assumed the Markov property when
defining the conditional probabilities. In some attacks it may
be necessary to return to previously compromised nodes to
proceed with the attack. In our mathematical formalism this
type of circular path is forbidden. We account for such a pos -
sibility and for the possibility that an attacker may have to
traverse the ingress path more than once, by including a
probability of APT “beacon success” at nodes where addi -
tional attack software code or APT commands are needed.
This eliminates cycles in the infiltration attack graph.
In general, it is possible to expand the node set to allow
for attack path histories to influence the probability of node
access; however, the tractability and insight that could be
gleaned from the model output might be hampered. Using
a similar approach, we could also remove the assumption
that the infiltration and exfiltration processes are indepen-
dent, but it’s not clear that such complexity would add
value to the model.
7 ILLUSTRATIVE CLOUD-TRUST RESULTS
To apply the model conditional probabilities are needed
for all network edges—the probability that given the APT
has access to the starting node of the edge, the APT will be
able to exploit a vulnerability, conduct surveillance and
identify, or obtain co-residency with the target node at the
end of the edge. Over 50 probability scores are needed to
fully characterize the Cloud-Trust infiltration Bayesian net-
work for a typical cloud architecture. For the illustrative
cloud architecture assessments presented in this paper
over 400 probability score inputs were estimated using a
variety of methods. Below we describe how some of these
estimates were made.
The scope of Cloud-Trust does not include the security
measures used in external network enclaves. So we assume
that an APT can gain access to relevant external network
enclaves and to cloud credentials stored there.
For some attack paths the attacker obtains initial cloud TZ
credentials by legitimate means. This is the initial step of the
VM side channel attack. In this case the attacker has a legiti -
mate public cloud account that enables him to instantiate a
VM in the public cloud in TZ B. The second step in this attack
is to move from a VM in TZ B to be co-resident with the tar-
get VM in TZ Gold. As described earlier in the attack narra-
tive there are various mechanisms that can be used in public
clouds to conduct surveillance and to move a VM into a pref-
erential location in the cloud so the attacker becomes co-resi-
dent with the target. We assess the success of these methods
for specific cloud architectures using two probability scores
p_s and p_cr. The value of these probabilities estimates,
shown in Table 3, are derived from the literature that applies
to different public cloud offerings [5], [14], [13].
We do not estimate the probability that a specific HV
will have exploitable vulnerabilities. Instead, we consider a
generic HV. HVs are large code bases that resemble OS ker-
nels, so we assume the probability is high that an unsigned
HV contains vulnerabilities. On the other hand, if the HV is
signed and trusted boot time measurements are available
from the manufacturer we reduce this probability signifi-
cantly as indicated in the table (in other words we assume
the HV still has vulnerabilities, but during a reboot they
will be detected and a “pristine” version of the HV can be
re-installed from a Gold Disk.
GONZALES ET AL.: CLOUD-TRUST—A SECURITY
ASSESSMENT MODEL FOR INFRASTRUCTURE AS A
SERVICE (IAAS) CLOUDS 533
The discussion above illustrates the types of probabilities
used in our approach: one, probabilities which represent
the likelihood that a particular type of activity can be
accomplished in the cloud (that is whether cloud security
controls are present or absent which would constrain or
eliminate the activity); two, probabilities that reflect the like-
lihood the attacker can gain access to one or more cloud
resources (e.g., whether IAM controls are in place to restrict
attacker access); and three, the probability that a specific
type of cloud component contains a vulnerability or prop-
erty which can be exploited by the attacker to maneuver to
or gain access to another cloud component. In many cases
such probabilities cannot be determined precisely by analyt-
ical means. For example, all vulnerabilities that are present
in a HV may not be known. In cases were there is significant
uncertainty in a vulnerability value, we assign one of five
values to the conditional probability: very high (set equal to
1), high (set equal to .9), medium (set equal to one half), low
(set equal to .1), and very low (.01). We estimate probabili -
ties of APT detection for each node class in the cloud archi-
tecture using a similar approach. There is also uncertainty
regarding specific conditional detection probabilities. In
these cases we also estimate the probabilities of detection on
a five level scale. Based on reports available in the open
press on the extent and longevity of APT attacks we do not
ascribe high detection probabilities to most edges in the
Bayesian network [41], [28], [42].
An alternative means to determine conditional attack
probabilities is to use the common vulnerability scoring sys-
tem (CVSS) [43]. CVSS scores associated with specific CCS
components could be used to estimate these conditional
probabilities. Such an approach would resemble that sug-
gested by earlier authors [38].
Illustrative Cloud-Trust results are shown in Table 4 for
the cloud architectures defined in Table 1. The cloud archi -
tectures with more capable security controls are estimated
to have lower probability of successful APT infiltration.
Not surprisingly, if the APT is detected prior to gold data
access, the probability of infiltration is reduced. This effect
is most pronounced in cloud architectures 3 and 4, which
have more robust security controls. However, one can see
that even with robust security controls, the estimated
probability of APT or threat detection are less than or
equal to 1/2 in all cases. The estimated cumulative APT
detection probability is � 1/2 in architectures 3 and 4
because the individual APT detection probabilities for
individual CCS components are estimated to be small
(with the exception of file access monitoring of the Agency
Gold data store in TZ G) and because file access monitor -
ing may not provide an effective APT detection capability
if the APT accesses TZ Gold using valid stolen credentials.
Cloud-Trust accounts for this possibility in the overall
assessments scores given above.
Cloud architecture 4 has the lowest probability of APT
infiltration. This architecture makes extensive use of encryp-
tion to protect VM images at rest and live VMs during
migration. It also uses a signed HV, and robust sys-admin
access control methods to verify the identity of both CSP
sys-admins and Agency cloud users. These security controls
make it more difficult for the APT to steal valid credentials
and obtain a long lasting presence in key CCS components,
such as the HV. If the HV or BIOS are modified by the APT,
there is a good chance the HV modification will be detected
(especially if the APT is a complex and large code base),
even if the APT itself can not be detected. The compromised
HV or BIOS can then be deleted, and a “pristine” version of
the HV can be re-installed from a Gold Disk.
8 CONCLUSION
We have demonstrated how Cloud-Trust can assess the
security status of IaaS CCSs and IaaS CSP service offerings,
and be used to estimate probabilities of APT infiltration and
detection. These quantify two key high level security met-
rics: IaaS CCS confidentiality and integrity. Cloud-Trust can
also quantify the value of specific CCS security controls
(including optional security features offered by leading
commercial CSPs). It can also be used to conduct sensitivity
analyses of the incremental value of adding specific security
controls to an IaaS CCS, when there is uncertainty regarding
the value of a specific security control (which may be
optional and increase the cost of CSP services, or which
may not be required by industry or government standards).
8.1 Potential Next Steps
The scope of initial version of Cloud-Trust is currently lim-
ited to IaaS CCSs and CSPs. It also does not include all pos-
sible insider attack vectors and methods. Possible next steps
are to extend Cloud-Trust to include the full range of insider
attacks, and to platform as a service (PaaS) and software as a
service (SaaS) CSPs.
TABLE 3
Selected Cloud-Trust Probability Scores
Attack Step Cloud Arch 1 Cloud Arch 2 Cloud Arch 3 Cloud
Arch 4
1 TZ B Access from Tenant B enclave 1 1 1 1
2a Establish co-residency—surveillance (p_s) 1 1 1 .1
2b Establish co-residency—VM movement (p_cr) 0.5 0.5 0.5 .01
3 Obtain credentials (varies by attack) 0.1 0.1 0.01 .01
4 Exploitable hypervisor vulnerability 0.9 0.9 0.9 .01
TABLE 4
Cloud-Trust Assessment Results
Cloud
Arch.
Infiltration
Probability with
APT Detection
Infiltration
Probability without
APT Detection
Detection
Probability (APT
accesses gold data)
1 0.89 0.99 0.1
2 0.84 0.98 0.14
3 0.25 0.46 0.46
4 0.004 0.007 0.5
534 IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL.
5, NO. 3, JULY-SEPTEMBER 2017
It would also be useful to develop a full set of data exfil -
tration APT attack steps that span the space of potential
CCS and CSP data exit routes. It would be useful to explore
how CVSS data could be used to estimate APT attack proba-
bilities. A robust sensitivity analysis could also be per -
formed using an enhanced version of Cloud-Trust that
includes insider attacks to see which CCS nodes and attack
paths present the greatest vulnerabilities and advantage to
attackers.
ACKNOWLEDGMENTS
This work was supported by the Institute of information
and infrastructure protection (I3P), the Department of
Homeland Security (DHS) National Cyber Security
Division, and the RAND Corporation, and was performed
under DHS contract #2006-CS-001-000001. The authors
thank Inette Furey of DHS and Martin Wybourne of Dar-
mouth College for sponsoring this research and Richard
George (Johns Hopkins University Applied Physics Labora-
tory), Dr Shari Pfleeger (Dartmouth University), and Kartik
Gopalan (Binghamton University (SUNY)) for useful con-
versations. Dan Gonzales is the corresponding author.
REFERENCES
[1] W. Jansen and T. Grance, “Guidelines on security and
privacy in
public cloud computing,” NIST Spec. Publ. 800–144, National
Institute of Standards and Technology, Gaithersburg, MD
20899,
Dec. 2011.
[2] P. Mell and T. Grance, “The NIST definition of cloud
computing,”
NIST, Gaithersburg, MD, USA, Tech, Rep. SP 800-145, 2011.
[3] P. Jamshidi, A. Ahmad, and C. Pahl, “Cloud migration
research: A
systematic review,” IEEE Trans. Cloud Comput., vol. 1, no. 2,
pp.
142–157, Jul.–Dec. 2013.
[4] L. Vaquero, L. Rodero-Merino, and D. Mor�an, “Locking
the sky: A
survey on IaaS cloud security,” Computing, vol. 91, no. 1, pp.
93–
118, Jan. 2011.
[5] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey,
you,
get off of my cloud: Exploring information leakage in third-
party
compute clouds,” in Proc. 16th ACM Conf. Comput. Commun.
Secu-
rity, 2009, pp. 199–212.
[6] A. Sood and R. Enbody, “Targeted cyber attacks-a superset
of
advanced persistent threats,” IEEE Security Privacy, vol. 11,
no. 1,
pp. 54–61, Jan./Feb. 2013.
[7] B. Krekel, “Capability of the people’s republic of china to
conduct
cyber warfare and computer network exploitation,” U.S.-China
Economic and Security Review Commission, Northrop
Grumman
Corp., DTIC Document, 2009.
[8] FedRAMP Security Controls, Federal Chief Information
Officer’s
Council [Online]. Available: http://cloud.cio.gov/document/
fedramp-security-controls, 2014.
[9] S. Zevin, Standards for Security Categorization of Federal
Information
and Information Systems, DIANE Publishing, 2009.
[10] M. Walla. (2000, May). Kerberos Explained [Online].
Available:
http://technet.microsoft.com/en-us/library/bb742516.aspx
[11] Microsoft. (2005, Aug. 22). Federation trusts [Online].
Available:
http://technet.microsoft.com/en-us/library/cc738707(v¼ws.10).
aspx
[12] VMWare. (2009). Network segmentation in virtualized
environ-
ments, BP-059-INF-02-01 [Online]. Available: http://www.
vmware.com/files/pdf/network_segmentation.pdf
[13] Amazon Web Services, AWS j Amazon Virtual Private
Cloud
(VPC)—Secure Private Cloud VPN [Online]. Available: http://
aws.amazon.com/vpc:/, May 2015.
[14] J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N.
Gruschka,
and L. Lo Iacono, “All your clouds are belong to us: security
anal-
ysis of cloud management interfaces,” in Proc. 3rd ACM
Workshop
Cloud Comput. Security Workshop, 2011, pp. 3–14.
[15] V. J. Winkler, Securing the Cloud: Cloud Computer
Security Techni-
ques and Tactics. Amsterdam, The Netherlands: Elsevier, 2011.
[16] Network Infrastructure Technology Overview, Version 8,
Release 3,
Defense Information Systems Agency, Aug. 27, 2010.
[17] G. Keeling, R. Bhattacharjee, and Y. Patil, Beyond the
hypervisor:
Three key areas to consider when securing your cloud
infrastruc-
ture platform. presented at the VMWorld 2012 [Online]. Avail-
able: http://www.vmworld.com/docs/DOC-6257 [Accessed: 29-
Oct-2014].
[18] A. Regenscheid. (Jul. 2012). BIOS Protection Guidelines
for Serv-
ers (Draft), 800–147B [Online]. Available: http://csrc.nist.gov/
publications/drafts/800–147b/draft-sp800–147b_july2012.pdf.
[19] Trusted Computing Group, Trusted Platform Module
(TPM) Sum-
mary [Online]. Available: http://www.trustedcomputinggroup.
org/resources/trusted_platform_module_tpm_summary, May
2015.
[20] S. Chalal, T. Kohlenberg, M. Kumar, S. Mancini, D.
Morgan, S.
Purcell, A. Ross, and C. Smith, (2010, Aug.). Evolution of
integrity
checking with intel� trusted execution technology: An intel IT
perspective Intel [Online]. Available: http://www.intel.com/con-
tent/dam/doc/white-paper/intel-it-security-trusted-execution-
technology-paper.pdf
[21] M. Hoekstra (2013, Sep. 26). Intel� SGX for Dummies
(Intel� SGX
Design Objectives) j Intel� Developer Zone [Online].
Available:
http://software.intel.com/en-us/blogs/2013/09/26/protecting-
application-secrets-with-intel-sgx
[22] F. McKeen, I. Alexandrovich, A. Berenzon, C. Rozas, H.
Shafi,
V. Shanbhogue, and U. Savagaonkaret, “Innovative instructions
and software model for isolated execution,” in Proc. 2nd Int.
Workshop Hardware and Architectural Support Security
Privacy,
ACM, 2013.
[23] T. Huber. (2013, Sep. 17). VXLAN—What it is,
components that
make it work, and benefits j VMware SMB blog—VMware
blogs
[Online]. Available: http://blogs.vmware.com/smb/2013/09/
vxlan-what-it-is-components-that-make-it-work-and-benefits.
html, Dec. 2013.
[24] W. Lambeth, B. A. Dalal, J. Deianov, and J. Xiao, “Private
allocated
networks over shared communications infrastructure,” U.S. Pat-
ent 8619771.
[25] D. Perez-Botero. (2011). A brief tutorial on live virtual
machine
migration from a security perspective. Princeton, NJ, USA:
Prince-
ton Univ. [Online]. Available: http://www.cs.princeton.edu/
�diegop/data/580_midterm_project.pdf
[26] M. Hines, U. Deshpande, and K. Gopalan, “Post-copy live
migra-
tion of virtual machines,” ACM SIGOPS Oper. Syst. Rev., vol.
43,
no. 3, Jul. 2009.
[27] M. I. Gofman, R. Luo, P. Yang, and K. Gopalan, “SPARC:
A secu-
rity and privacy aware virtual machine checkpointing mecha-
nism,” in Proc. 10th Annu. ACM Workshop Privacy Electronic
Soc.,
2011, pp. 115–124.
[28] Mandiant, “M-Trends 2010: The advanced persistent
threat,”
Mandiant, [Online]. Available: https://www.mandiant.com/
resources/mandiant-reports/, 2010.
[29] D. X. Song, D. Wagner, and X. Tian, “Timing analysis of
key-
strokes and timing attacks on SSH,” in Proc. USENIX Security
Symp., 2001, vol. 2001.
[30] J. Fortes, “Cloud computing security: What changes with
soft-
ware-defined networking?” presented at the ARO Workshop
Cloud Security, George Mason University, Fairfax, VA, Mar.
11,
2013.
[31] M. J. Schwartz. (2012, Jun. 13). New virtualization
vulnerability
allows escape to hypervisor attacks—informationweek [Online].
Available: http://www.informationweek.com/security/risk-
management/new-virtualization-vulnerability-allows-escape-to-
hypervisor-attacks/d/d-id/1104823
[32] E. Ray and E. Schultz, “Virtualization security,” in Proc.
5th Annu.
Workshop Cyber Security Inform. Intell. Res.: Cyber Security
Inform.
Intell. Challenges Strategies, 2009, p. 42.
[33] T. Katsuki. (2012, Aug. 20). Crisis for windows sneaks
onto virtual
machines [Online]. Available: http://www.symantec.com/con-
nect/blogs/crisis-windows-sneaks-virtual-machines
[34] F. Breedijk. (2009, Jul. 31). Blackhat talk: Cloudburst—
VMWare
guest to host escapes by Kostya Kirtchinsky [Online].
Available:
http://www.cupfighter.net/index.php/2009/07/blackhat-cloud-
burst-vmware-guest-to-host-escape:/
[35] Homeland Security News Wire. (2011, Aug. 22). Japanese
pharma-
ceutical crippled by insider cyberattack, Homeland Security
News
Wire [Online]. Available: http://www.homelandsecuritynews-
wire.com/japanese-pharmaceutical-crippled-insider-cyberattack
GONZALES ET AL.: CLOUD-TRUST—A SECURITY
ASSESSMENT MODEL FOR INFRASTRUCTURE AS A
SERVICE (IAAS) CLOUDS 535
[36] J. Rutkowska and A. Tereshkin, “Bluepilling the xen
hypervisor,”
presented at the 2008 Blackhat Conf., Las Vegas, NV, USA,
Aug.
2008.
[37] J. O. Sheyner, S. J. Haines, R. Lippmann, and J. M. Wing,
“Automated generation and analysis of attack graphs,” in Proc.
IEEE Symp. Secur. Priv., 2002, pp. 273–284.
[38] A. Singhal and X. Ou, Security Risk Analysis of Enterprise
Networks
Using Probabilistic Attack Graphs, Nat. Inst. Sci. Technol.,
Gaithers-
burg, MD, USA, Nat. Inst. Sci. Technol. Interagency Rep. 7788,
Aug. 2011.
[39] M. Frigault, L. Wang, A. Singhal, and S. Jajodia,
“Measuring
network security using dynamic Bayesian network,” in Proc. 4th
ACM Workshop Quality Protection, 2008, pp. 23–30.
[40] I. Ben-Gal, “Bayesian networks,” Encycl. Stat. Qual.
Reliab. Mar.
2008, Available at the Wiley online library: http://onlinelibrary.
wiley.com/doi/10.1002/9780470061572.eqr089/pdf
[41] C. Glyer and R. Kazanciyan, “The ‘Hikit’ Rootkit:
Advanced and
persistent attack techniques (Part 2),” [Online]. Available:
https://www.mandiant.com/blog/hikit-rootkit-advanced-per-
sistent-attack-techniques-part-2/, Aug. 2012.
[42] D. Alperovitch, Revealed: Operation Shady RAT, McAfee.
(2011)
[Online]. Available: http://noramintel.com/wp-content/
uploads/2011/08/McAfee-wp-operation-shady-rat.pdf
[43] P. Mell, K. Scarfone, and S. Romanosky. (2007, Jun.).
CVSS v2
Complete Documentation [Online]. Available: http://www.first.
org/cvss/cvss-guide.html
[44] H. Thimbleby, S. Anderson, and P. Cairns, “A framework
for
modelling Trojans and computer virus infection,” Comput. J.,
vol. 41, no. 7, pp. 444–458, Jan. 1998.
[45] K. Ingols, M. Chu, R. Lippmann, S. Webster, and S. Boyer,
“Modeling modern network attacks and countermeasures using
attack graphs,” in Proc. Annu. Comput. Security Appl. Conf.,
2009,
pp. 117–126.
[46] P. K. Tysowski and M. A. Hasan, “Hybrid attribute- and re-
encryption-based key management for secure and scalable
mobile
applications in clouds,” IEEE Trans. Cloud Comput., vol. 1, no.
2,
pp. 172–186, Jul.–Dec. 2013.
Daniel Gonzales received the BS degree in
physics from Stanford University in 1979, and the
PhD degree in theoretical physics from MIT in
1985. His research includes command, control
(C2) and communications and intelligence sys-
tems, information assurance (IA), and cloud com-
puting. He has examined performance, testing,
and strategy issues for enterprise computing
systems, radios, biometrics systems, cloud com-
puting, and electronic warfare (EW) systems for
the US Army, US Navy, DHS, and the Office of
the Secretary of Defense. He is a member of the IEEE.
Jeremy M. Kaplan received the BA degree in
physics from Columbia College in 1967 and the
PhD degree in physics from Columbia University in
1976. He is a private consultant and RAND adjunct
staff member. He researches information system
security. At the Defense Information Systems
Agency (DISA), he led development of architec-
ture, systems engineering, test, and communica-
tions planning for DoD nuclear C2. He received the
Presidential Rank Award of Meritorious Executive
in the Senior Executive Service. He has also cre-
ated leading-edge concepts for the dynamic modeling of
networks.
Evan Saltzman received the BS degree in math-
ematics and economics from the College of Wil-
liam and Mary and the MS degree in operations
research at Georgia Tech. He was at RAND from
2010 to 2014. He has examined supply chain and
workflow management systems, and was an
adjunct faculty member in the School of Manage-
ment at George Mason University. Prior to joining
RAND, he was an ORISE fellow at the Centers
for Disease Control and Prevention (CDC).
Zev Winkelman received the BS degree in
computer engineering from the University of
Michigan, the MS degree in Criminal Justice from
the John Jay College of Criminal Justice, and the
PhD degree in public policy from US Berkeley.
He is on the faculty of the Pardee RAND Gradu-
ate School and researches big data analytics,
social media, and cyber security. He has
more than 15 years of experience in computer
engineering and software development. He has
implemented systems that allow analysts to fuse,
analyze and visualize datasets across multiple domains.
Dulani Woods received the BS degrees in
mechanical engineering and marine engineering/
naval architecture from the US Coast Guard
Academy, and the MS degree in agricultural eco-
nomics from Purdue University. He is a data ana-
lyst and a modeler at RAND. His research has
included assessing design tradeoffs for a fleet of
offshore patrol cutters for the US Coast Guard.
He served as a Coast Guard Officer from 1995 to
2004.
" For more information on this or any other computing topic,
please visit our Digital Library at
www.computer.org/publications/dlib.
536 IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL.
5, NO. 3, JULY-SEPTEMBER 2017
<<
/ASCII85EncodePages false
/AllowTransparency false
/AutoPositionEPSFiles true
/AutoRotatePages /None
/Binding /Left
/CalGrayProfile (Gray Gamma 2.2)
/CalRGBProfile (sRGB IEC61966-2.1)
/CalCMYKProfile (U.S. Web Coated 050SWOP051 v2)
/sRGBProfile (sRGB IEC61966-2.1)
/CannotEmbedFontPolicy /Warning
/CompatibilityLevel 1.4
/CompressObjects /Off
/CompressPages true
/ConvertImagesToIndexed true
/PassThroughJPEGImages true
/CreateJobTicket false
/DefaultRenderingIntent /Default
/DetectBlends true
/DetectCurves 0.0000
/ColorConversionStrategy /sRGB
/DoThumbnails true
/EmbedAllFonts true
/EmbedOpenType false
/ParseICCProfilesInComments true
/EmbedJobOptions true
/DSCReportingLevel 0
/EmitDSCWarnings false
/EndPage -1
/ImageMemory 1048576
/LockDistillerParams true
/MaxSubsetPct 100
/Optimize true
/OPM 0
/ParseDSCComments false
/ParseDSCCommentsForDocInfo true
/PreserveCopyPage true
/PreserveDICMYKValues true
/PreserveEPSInfo false
/PreserveFlatness true
/PreserveHalftoneInfo true
/PreserveOPIComments false
/PreserveOverprintSettings true
/StartPage 1
/SubsetFonts false
/TransferFunctionInfo /Remove
/UCRandBGInfo /Preserve
/UsePrologue false
/ColorSettingsFile ()
/AlwaysEmbed [ true
/Algerian
/Arial-Black
/Arial-BlackItalic
/Arial-BoldItalicMT
/Arial-BoldMT
/Arial-ItalicMT
/ArialMT
/ArialNarrow
/ArialNarrow-Bold
/ArialNarrow-BoldItalic
/ArialNarrow-Italic
/ArialUnicodeMS
/BaskOldFace
/Batang
/Bauhaus93
/BellMT
/BellMTBold
/BellMTItalic
/BerlinSansFB-Bold
/BerlinSansFBDemi-Bold
/BerlinSansFB-Reg
/BernardMT-Condensed
/BodoniMTPosterCompressed
/BookAntiqua
/BookAntiqua-Bold
/BookAntiqua-BoldItalic
/BookAntiqua-Italic
/BookmanOldStyle
/BookmanOldStyle-Bold
/BookmanOldStyle-BoldItalic
/BookmanOldStyle-Italic
/BookshelfSymbolSeven
/BritannicBold
/Broadway
/BrushScriptMT
/CalifornianFB-Bold
/CalifornianFB-Italic
/CalifornianFB-Reg
/Centaur
/Century
/CenturyGothic
/CenturyGothic-Bold
/CenturyGothic-BoldItalic
/CenturyGothic-Italic
/CenturySchoolbook
/CenturySchoolbook-Bold
/CenturySchoolbook-BoldItalic
/CenturySchoolbook-Italic
/Chiller-Regular
/ColonnaMT
/ComicSansMS
/ComicSansMS-Bold
/CooperBlack
/CourierNewPS-BoldItalicMT
/CourierNewPS-BoldMT
/CourierNewPS-ItalicMT
/CourierNewPSMT
/EstrangeloEdessa
/FootlightMTLight
/FreestyleScript-Regular
/Garamond
/Garamond-Bold
/Garamond-Italic
/Georgia
/Georgia-Bold
/Georgia-BoldItalic
/Georgia-Italic
/Haettenschweiler
/HarlowSolid
/Harrington
/HighTowerText-Italic
/HighTowerText-Reg
/Impact
/InformalRoman-Regular
/Jokerman-Regular
/JuiceITC-Regular
/KristenITC-Regular
/KuenstlerScript-Black
/KuenstlerScript-Medium
/KuenstlerScript-TwoBold
/KunstlerScript
/LatinWide
/LetterGothicMT
/LetterGothicMT-Bold
/LetterGothicMT-BoldOblique
/LetterGothicMT-Oblique
/LucidaBright
/LucidaBright-Demi
/LucidaBright-DemiItalic
/LucidaBright-Italic
/LucidaCalligraphy-Italic
/LucidaConsole
/LucidaFax
/LucidaFax-Demi
/LucidaFax-DemiItalic
/LucidaFax-Italic
/LucidaHandwriting-Italic
/LucidaSansUnicode
/Magneto-Bold
/MaturaMTScriptCapitals
/MediciScriptLTStd
/MicrosoftSansSerif
/Mistral
/Modern-Regular
/MonotypeCorsiva
/MS-Mincho
/MSReferenceSansSerif
/MSReferenceSpecialty
/NiagaraEngraved-Reg
/NiagaraSolid-Reg
/NuptialScript
/OldEnglishTextMT
/Onyx
/PalatinoLinotype-Bold
/PalatinoLinotype-BoldItalic
/PalatinoLinotype-Italic
/PalatinoLinotype-Roman
/Parchment-Regular
/Playbill
/PMingLiU
/PoorRichard-Regular
/Ravie
/ShowcardGothic-Reg
/SimSun
/SnapITC-Regular
/Stencil
/SymbolMT
/Tahoma
/Tahoma-Bold
/TempusSansITC
/TimesNewRomanMT-ExtraBold
/TimesNewRomanMTStd
/TimesNewRomanMTStd-Bold
/TimesNewRomanMTStd-BoldCond
/TimesNewRomanMTStd-BoldIt
/TimesNewRomanMTStd-Cond
/TimesNewRomanMTStd-CondIt
/TimesNewRomanMTStd-Italic
/TimesNewRomanPS-BoldItalicMT
/TimesNewRomanPS-BoldMT
/TimesNewRomanPS-ItalicMT
/TimesNewRomanPSMT
/Times-Roman
/Trebuchet-BoldItalic
/TrebuchetMS
/TrebuchetMS-Bold
/TrebuchetMS-Italic
/Verdana
/Verdana-Bold
/Verdana-BoldItalic
/Verdana-Italic
/VinerHandITC
/Vivaldii
/VladimirScript
/Webdings
/Wingdings2
/Wingdings3
/Wingdings-Regular
/ZapfChanceryStd-Demi
/ZWAdobeF
]
/NeverEmbed [ true
]
/AntiAliasColorImages false
/CropColorImages true
/ColorImageMinResolution 150
/ColorImageMinResolutionPolicy /OK
/DownsampleColorImages true
/ColorImageDownsampleType /Bicubic
/ColorImageResolution 150
/ColorImageDepth -1
/ColorImageMinDownsampleDepth 1
/ColorImageDownsampleThreshold 1.50000
/EncodeColorImages true
/ColorImageFilter /DCTEncode
/AutoFilterColorImages false
/ColorImageAutoFilterStrategy /JPEG
/ColorACSImageDict <<
/QFactor 0.76
/HSamples [2 1 1 2] /VSamples [2 1 1 2]
>>
/ColorImageDict <<
/QFactor 0.40
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/JPEG2000ColorACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 15
>>
/JPEG2000ColorImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 15
>>
/AntiAliasGrayImages false
/CropGrayImages true
/GrayImageMinResolution 150
/GrayImageMinResolutionPolicy /OK
/DownsampleGrayImages true
/GrayImageDownsampleType /Bicubic
/GrayImageResolution 300
/GrayImageDepth -1
/GrayImageMinDownsampleDepth 2
/GrayImageDownsampleThreshold 1.50000
/EncodeGrayImages true
/GrayImageFilter /DCTEncode
/AutoFilterGrayImages false
/GrayImageAutoFilterStrategy /JPEG
/GrayACSImageDict <<
/QFactor 0.76
/HSamples [2 1 1 2] /VSamples [2 1 1 2]
>>
/GrayImageDict <<
/QFactor 0.40
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/JPEG2000GrayACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 15
>>
/JPEG2000GrayImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 15
>>
/AntiAliasMonoImages false
/CropMonoImages true
/MonoImageMinResolution 1200
/MonoImageMinResolutionPolicy /OK
/DownsampleMonoImages true
/MonoImageDownsampleType /Bicubic
/MonoImageResolution 600
/MonoImageDepth -1
/MonoImageDownsampleThreshold 1.50000
/EncodeMonoImages true
/MonoImageFilter /CCITTFaxEncode
/MonoImageDict <<
/K -1
>>
/AllowPSXObjects false
/CheckCompliance [
/None
]
/PDFX1aCheck false
/PDFX3Check false
/PDFXCompliantPDFOnly false
/PDFXNoTrimBoxError true
/PDFXTrimBoxToMediaBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXSetBleedBoxToMediaBox true
/PDFXBleedBoxToTrimBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXOutputIntentProfile (None)
/PDFXOutputConditionIdentifier ()
/PDFXOutputCondition ()
/PDFXRegistryName ()
/PDFXTrapped /False
/CreateJDFFile false
/Description <<
/CHS
<FEFF4f7f75288fd94e9b8bbe5b9a521b5efa76840020004100640
06f006200650020005000440046002065876863900275284e8e55
464e1a65876863768467e5770b548c62535370300260a853ef4ee5
4f7f75280020004100630072006f0062006100740020548c002000
410064006f0062006500200052006500610064006500720020003
5002e003000204ee553ca66f49ad87248672c676562535f00521b5
efa768400200050004400460020658768633002>
/CHT
<FEFF4f7f752890194e9b8a2d7f6e5efa7acb76840020004100640
06f006200650020005000440046002065874ef69069752865bc66
6e901a554652d965874ef6768467e5770b548c52175370300260a
853ef4ee54f7f75280020004100630072006f00620061007400205
48c002000410064006f0062006500200052006500610064006500
7200200035002e003000204ee553ca66f49ad87248672c4f86958b
555f5df25efa7acb76840020005000440046002065874ef63002>
/DAN
<FEFF004200720075006700200069006e0064007300740069006
c006c0069006e006700650072006e0065002000740069006c0020
006100740020006f0070007200650074007400650020004100640
06f006200650020005000440046002d0064006f006b0075006d00
65006e007400650072002c0020006400650072002000650067006
e006500720020007300690067002000740069006c002000640065
00740061006c006a006500720065007400200073006b00e600720
06d007600690073006e0069006e00670020006f00670020007500
640073006b007200690076006e0069006e0067002000610066002
00066006f0072007200650074006e0069006e006700730064006f
006b0075006d0065006e007400650072002e00200044006500200
06f00700072006500740074006500640065002000500044004600
2d0064006f006b0075006d0065006e0074006500720020006b006
1006e002000e50062006e00650073002000690020004100630072
006f00620061007400200065006c006c006500720020004100630
072006f0062006100740020005200650061006400650072002000
35002e00300020006f00670020006e0079006500720065002e>
/DEU
<FEFF00560065007200770065006e00640065006e00200053006
90065002000640069006500730065002000450069006e00730074
0065006c006c0075006e00670065006e0020007a0075006d00200
0450072007300740065006c006c0065006e00200076006f006e00
2000410064006f006200650020005000440046002d0044006f006
b0075006d0065006e00740065006e002c00200075006d00200065
0069006e00650020007a0075007600650072006c00e4007300730
0690067006500200041006e007a00650069006700650020007500
6e00640020004100750073006700610062006500200076006f006
e00200047006500730063006800e40066007400730064006f006b
0075006d0065006e00740065006e0020007a00750020006500720
07a00690065006c0065006e002e00200044006900650020005000
440046002d0044006f006b0075006d0065006e007400650020006
b00f6006e006e0065006e0020006d006900740020004100630072
006f00620061007400200075006e0064002000520065006100640
065007200200035002e003000200075006e00640020006800f600
680065007200200067006500f600660066006e006500740020007
70065007200640065006e002e>
/ESP
<FEFF005500740069006c0069006300650020006500 730074006
100200063006f006e0066006900670075007200610063006900f3
006e0020007000610072006100200063007200650061007200200
064006f00630075006d0065006e0074006f007300200064006500
2000410064006f006200650020005000440046002000610064006
50063007500610064006f00730020007000610072006100200076
0069007300750061006c0069007a00610063006900f3006e00200
06500200069006d0070007200650073006900f3006e0020006400
6500200063006f006e006600690061006e007a006100200064006
500200064006f00630075006d0065006e0074006f007300200063
006f006d00650072006300690061006c00650073002e002000530
065002000700075006500640065006e0020006100620072006900
7200200064006f00630075006d0065006e0074006f00730020005
000440046002000630072006500610064006f007300200063006f
006e0020004100630072006f006200610074002c0020004100640
06f00620065002000520065006100640065007200200035002e00
3000200079002000760065007200730069006f006e00650073002
00070006f00730074006500720069006f007200650073002e>
/FRA
<FEFF005500740069006c006900730065007a002000630065007
30020006f007000740069006f006e00730020006100660069006e
00200064006500200063007200e90065007200200064006500730
0200064006f00630075006d0065006e0074007300200041006400
6f006200650020005000440046002000700072006f00660065007
300730069006f006e006e0065006c007300200066006900610062
006c0065007300200070006f007500720020006c0061002000760
069007300750061006c00690073006100740069006f006e002000
6500740020006c00270069006d007000720065007300730069006
f006e002e0020004c0065007300200064006f00630075006d0065
006e00740073002000500044004600200063007200e900e900730
02000700065007500760065006e0074002000ea00740072006500
20006f007500760065007200740073002000640061006e0073002
0004100630072006f006200610074002c002000610069006e0073
0069002000710075002700410064006f006200650020005200650
06100640065007200200035002e00300020006500740020007600
65007200730069006f006e007300200075006c007400e90072006
900650075007200650073002e>
/ITA (Utilizzare queste impostazioni per creare documenti
Adobe PDF adatti per visualizzare e stampare documenti
aziendali in modo affidabile. I documenti PDF creati possono
essere aperti con Acrobat e Adobe Reader 5.0 e versioni
successive.)
/JPN
<FEFF30d330b830cd30b9658766f8306e8868793a304a30883073
53705237306b90693057305f002000410064006f0062006500200
050004400460020658766f8306e4f5c6210306b4f7f75283057307
e305930023053306e8a2d5b9a30674f5c62103055308c305f00200
05000440046002030d530a130a430eb306f300100410063007200
6f0062006100740020304a30883073002000410064006f0062006
5002000520065006100640065007200200035002e003000204ee5
964d3067958b304f30533068304c3067304d307e3059300230533
06e8a2d5b9a3067306f30d530a930f330c 8306e57cb30818fbc307f
3092884c3044307e30593002>
/KOR
<FEFFc7740020c124c815c7440020c0acc6a9d558c5ec0020be44
c988b2c8c2a40020bb38c11cb97c0020c548c815c801c73cb85c00
20bcf4ace00020c778c1c4d558b2940020b3700020ac00c7a50020
c801d569d55c002000410064006f0062006500200050004400460
020bb38c11cb97c0020c791c131d569b2c8b2e4002e0020c774b8
07ac8c0020c791c131b41c00200050004400460020bb38c11cb29
40020004100630072006f0062006100740020bc0f002000410064
006f00620065002000520065006100640065007200200035002e0
0300020c774c0c1c5d0c11c0020c5f40020c2180020c788c2b5b2c
8b2e4002e>
/NLD (Gebruik deze instellingen om Adobe PDF-documenten
te maken waarmee zakelijke documenten betrouwbaar kunnen
worden weergegeven en afgedrukt. De gemaakte PDF-
documenten kunnen worden geopend met Acrobat en Adobe
Reader 5.0 en hoger.)
/NOR
<FEFF004200720075006b0020006400690073007300650020006
9006e006e007300740069006c006c0069006e00670065006e0065
002000740069006c002000e50020006f007000700072006500740
0740065002000410064006f006200650020005000440046002d00
64006f006b0075006d0065006e00740065007200200073006f006
d002000650072002000650067006e0065007400200066006f0072
0020007000e5006c006900740065006c006900670020007600690
073006e0069006e00670020006f00670020007500740073006b00
7200690066007400200061007600200066006f007200720065007
4006e0069006e006700730064006f006b0075006d0065006e0074
00650072002e0020005000440046002d0064006f006b0075006d0
065006e00740065006e00650020006b0061006e002000e5007000
6e00650073002000690020004100630072006f006200610074002
00065006c006c00650072002000410064006f0062006500200052
0065006100640065007200200035002e003000200065006c006c0
0650072002e>
/PTB
<FEFF005500740069006c0069007a00650020006500730073006
1007300200063006f006e00660069006700750072006100e700f5
0065007300200064006500200066006f0072006d0061002000610
0200063007200690061007200200064006f00630075006d006500
6e0074006f0073002000410064006f00620065002000500044004
600200061006400650071007500610064006f0073002000700061
0072006100200061002000760069007300750061006c0069007a0
06100e700e3006f002000650020006100200069006d0070007200
650073007300e3006f00200063006f006e0066006900e10076006
50069007300200064006500200064006f00630075006d0065006e
0074006f007300200063006f006d0065007200630069006100690
073002e0020004f007300200064006f00630075006d0065006e00
74006f00730020005000440046002000630072006900610064006
f007300200070006f00640065006d002000730065007200200061
0062006500720074006f007300200063006f006d0020006f00200
04100630072006f006200610074002000650020006f0020004100
64006f00620065002000520065006100640065007200200035002
e0030002000650020007600650072007300f50065007300200070
006f00730074006500720069006f007200650073002e>
/SUO
<FEFF004b00e40079007400e40020006e00e40069007400e4002
000610073006500740075006b007300690061002c0020006b0075
006e0020006c0075006f0074002000410064006f0062006500200
050004400460020002d0064006f006b0075006d0065006e007400
740065006a0061002c0020006a006f0074006b006100200073006
f0070006900760061007400200079007200690074007900730061
007300690061006b00690072006a006f006a0065006e0020006c0
075006f00740065007400740061007600610061006e0020006e00
e400790074007400e4006d0069007300650065006e0020006a006
1002000740075006c006f007300740061006d0069007300650065
006e002e0020004c0075006f00640075007400200050004400460
02d0064006f006b0075006d0065006e0074006900740020007600
6f0069006400610061006e0020006100760061007400610020004
100630072006f0062006100740069006c006c00610020006a0061
002000410064006f0062006500200052006500610064006500720
0200035002e0030003a006c006c00610020006a00610020007500
7500640065006d006d0069006c006c0061002e>
/SVE
<FEFF0041006e007600e4006e00640020006400650020006800e
4007200200069006e0073007400e4006c006c006e0069006e0067
00610072006e00610020006f006d0020006400750020007600690
06c006c00200073006b006100700061002000410064006f006200
650020005000440046002d0064006f006b0075006d0065006e007
400200073006f006d002000700061007300730061007200200066
00f60072002000740069006c006c006600f60072006c006900740
06c006900670020007600690073006e0069006e00670020006f00
6300680020007500740073006b007200690066007400650072002
000610076002000610066006600e4007200730064006f006b0075
006d0065006e0074002e002000200053006b00610070006100640
0650020005000440046002d0064006f006b0075006d0065006e00
740020006b0061006e002000f600700070006e006100730020006
90020004100630072006f0062006100740020006f006300680020
00410064006f00620065002000520065006100640065007200200
035002e00300020006f00630068002000730065006e0061007200
65002e>
/ENU (Use these settings to create PDFs that match the
"Suggested" settings for PDF Specification 4.0)
>>
>> setdistillerparams
<<
/HWResolution [600 600]
/PageSize [612.000 792.000]
>> setpagedevice

More Related Content

PPT
Cloud Security and their classifications
KENNEDYDONATO1
 
PDF
An approach for secured data transmission at client end in cloud computing
IAEME Publication
 
PPT
Tutorial-security-privacy-cloud computing.ppt
shahid sultan
 
PPTX
Cloud Achitecture and Security.pptx
IssahakukuwereJalilu
 
PDF
07 20251 latest trends, challenges ed
IAESIJEECS
 
PPTX
18CSE442 Cloud Security Introduction SRM.pptx
191013607gouthamsric
 
PDF
Implementation_of_User_Authentication_as
Masood Shah
 
PDF
Implementation of user authentication as a service for cloud network
Salam Shah
 
Cloud Security and their classifications
KENNEDYDONATO1
 
An approach for secured data transmission at client end in cloud computing
IAEME Publication
 
Tutorial-security-privacy-cloud computing.ppt
shahid sultan
 
Cloud Achitecture and Security.pptx
IssahakukuwereJalilu
 
07 20251 latest trends, challenges ed
IAESIJEECS
 
18CSE442 Cloud Security Introduction SRM.pptx
191013607gouthamsric
 
Implementation_of_User_Authentication_as
Masood Shah
 
Implementation of user authentication as a service for cloud network
Salam Shah
 

Similar to Cloud-Trust—a Security Assessment Modelfor Infrastructure as (20)

PDF
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Eswar Publications
 
DOCX
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
I3E Technologies
 
PDF
Cloud computing challenges and solutions
IJCNCJournal
 
PDF
Building The Infrastructure For Cloud Security 1st Ed Raghuram Yeluri
ejehadoum
 
PDF
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
Claire Webber
 
PDF
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
PDF
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
PDF
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
 
DOCX
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
audeleypearl
 
PDF
SAFETY: A Framework for Secure IaaS Clouds
Eswar Publications
 
PDF
FRAMEWORK FOR SECURE CLOUD COMPUTING
ijccsa
 
PDF
Vertualisation
Chkifa Khalid
 
PPTX
Cloud computing and Cloud security fundamentals
Viresh Suri
 
PDF
Cloud Security - Emerging Facets and Frontiers
Gokul Alex
 
PDF
AWS Security Challenges
STO STRATEGY
 
PDF
Full download Cloud Computing: Concepts, Technology, Security, and Architectu...
miyansatii
 
PDF
6620handout4t
Shahbaz Sidhu
 
PDF
The 3 Recommendations for Cloud Security
VAST
 
PDF
(Pdf) yury chemerkin _i-society-2013 proceedings
STO STRATEGY
 
PDF
AWS Cloud Security From the Point of View of the Compliance
Yury Chemerkin
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Eswar Publications
 
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
I3E Technologies
 
Cloud computing challenges and solutions
IJCNCJournal
 
Building The Infrastructure For Cloud Security 1st Ed Raghuram Yeluri
ejehadoum
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
Claire Webber
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
 
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
audeleypearl
 
SAFETY: A Framework for Secure IaaS Clouds
Eswar Publications
 
FRAMEWORK FOR SECURE CLOUD COMPUTING
ijccsa
 
Vertualisation
Chkifa Khalid
 
Cloud computing and Cloud security fundamentals
Viresh Suri
 
Cloud Security - Emerging Facets and Frontiers
Gokul Alex
 
AWS Security Challenges
STO STRATEGY
 
Full download Cloud Computing: Concepts, Technology, Security, and Architectu...
miyansatii
 
6620handout4t
Shahbaz Sidhu
 
The 3 Recommendations for Cloud Security
VAST
 
(Pdf) yury chemerkin _i-society-2013 proceedings
STO STRATEGY
 
AWS Cloud Security From the Point of View of the Compliance
Yury Chemerkin
 

More from WilheminaRossi174 (20)

DOCX
Senior Seminar in Business Administration BUS 499Coope.docx
WilheminaRossi174
 
DOCX
Select two countries that have been or currently are in confli.docx
WilheminaRossi174
 
DOCX
Serial KillersFor this assignment you will review a serial kille.docx
WilheminaRossi174
 
DOCX
SESSION 1Michael Delarosa, Department ManagerWhat sugg.docx
WilheminaRossi174
 
DOCX
Sheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docx
WilheminaRossi174
 
DOCX
Selecting & Implementing Interventions – Assignment #4.docx
WilheminaRossi174
 
DOCX
Seediscussions,stats,andauthorprofilesforthispublicati.docx
WilheminaRossi174
 
DOCX
Shared Reading FrameworkFollow this framework when viewing the v.docx
WilheminaRossi174
 
DOCX
Self-disclosureDepth of reflectionResponse demonstrates an in.docx
WilheminaRossi174
 
DOCX
Sheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docx
WilheminaRossi174
 
DOCX
Seemingly riding on the coattails of SARS-CoV-2, the alarming sp.docx
WilheminaRossi174
 
DOCX
See the attachment of 1 Article belowPlease answer all the que.docx
WilheminaRossi174
 
DOCX
SHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docx
WilheminaRossi174
 
DOCX
Select a healthcare legislature of interest. Discuss the historica.docx
WilheminaRossi174
 
DOCX
See discussions, stats, and author profiles for this publicati.docx
WilheminaRossi174
 
DOCX
Segmented Assimilation Theory and theLife Model An Integrat.docx
WilheminaRossi174
 
DOCX
Select a local, state, or national public policy that is relev.docx
WilheminaRossi174
 
DOCX
School of Community and Environmental HealthMPH Program .docx
WilheminaRossi174
 
DOCX
School Effects on Psychological Outcomes During Adolescence.docx
WilheminaRossi174
 
DOCX
Search the gene belonging to the accession id you selected in week 2.docx
WilheminaRossi174
 
Senior Seminar in Business Administration BUS 499Coope.docx
WilheminaRossi174
 
Select two countries that have been or currently are in confli.docx
WilheminaRossi174
 
Serial KillersFor this assignment you will review a serial kille.docx
WilheminaRossi174
 
SESSION 1Michael Delarosa, Department ManagerWhat sugg.docx
WilheminaRossi174
 
Sheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docx
WilheminaRossi174
 
Selecting & Implementing Interventions – Assignment #4.docx
WilheminaRossi174
 
Seediscussions,stats,andauthorprofilesforthispublicati.docx
WilheminaRossi174
 
Shared Reading FrameworkFollow this framework when viewing the v.docx
WilheminaRossi174
 
Self-disclosureDepth of reflectionResponse demonstrates an in.docx
WilheminaRossi174
 
Sheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docx
WilheminaRossi174
 
Seemingly riding on the coattails of SARS-CoV-2, the alarming sp.docx
WilheminaRossi174
 
See the attachment of 1 Article belowPlease answer all the que.docx
WilheminaRossi174
 
SHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docx
WilheminaRossi174
 
Select a healthcare legislature of interest. Discuss the historica.docx
WilheminaRossi174
 
See discussions, stats, and author profiles for this publicati.docx
WilheminaRossi174
 
Segmented Assimilation Theory and theLife Model An Integrat.docx
WilheminaRossi174
 
Select a local, state, or national public policy that is relev.docx
WilheminaRossi174
 
School of Community and Environmental HealthMPH Program .docx
WilheminaRossi174
 
School Effects on Psychological Outcomes During Adolescence.docx
WilheminaRossi174
 
Search the gene belonging to the accession id you selected in week 2.docx
WilheminaRossi174
 

Recently uploaded (20)

PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PPTX
CDH. pptx
AneetaSharma15
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PDF
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
CDH. pptx
AneetaSharma15
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 

Cloud-Trust—a Security Assessment Modelfor Infrastructure as

  • 1. Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds Dan Gonzales, Member, IEEE, Jeremy M. Kaplan, Evan Saltzman, Zev Winkelman, and Dulani Woods Abstract—The vulnerability of cloud computing systems (CCSs) to advanced persistent threats (APTs) is a significant concern to government and industry. We present a cloud architecture reference model that incorporates a wide range of security controls and best practices, and a cloud security assessment model—Cloud- Trust—that estimates high level security metrics to quantify the degree of confidentiality and integrity offered by a CCS or cloud service provider (CSP). Cloud-Trust is used to assess the security level of four multi-tenant IaaS cloud architectures equipped with alternative cloud security controls. Results show the probability of CCS penetration (high value data compromise) is high if a minimal set of security controls are implemented. CCS penetration probability drops substantially if a cloud defense in depth security architecture is adopted that protects virtual machine (VM) images at rest, strengthens
  • 2. CSP and cloud tenant system administrator access controls, and which employs other network security controls to minimize cloud network surveillance and discovery of live VMs. Index Terms—Cloud computing, cyber security, advanced persistent threats, security metrics, virtual machine (VM) isolation Ç 1 INTRODUCTION THE flexibility and scalability of CCSs can offer signifi -cant benefits to government and private industry [1], [2]. However, it can be difficult to transition legacy software to the cloud [3]. Concerns have also been raised as to whether cloud users can trust CSPs to protect cloud tenant data and whether CCSs can prevent the unauthorized dis- closure of sensitive or private information. The literature is rife with studies of CCS security vulnerabilities that can be exploited by APTs [4], [5], [6], [7]. Virtualization, the basis for most CCSs, enables CSPs to start, stop, move, and restart computing workloads on demand. VMs run on computing hardware that may be shared by cloud tenants. This enables flexibility and elastic- ity, but introduces security concerns. The security status of a CCS depends on many factors, including security applica- tions running on the system, the hypervisor (HV) and asso- ciated protection measures, the design patterns used to isolate the control plane from cloud tenants, the level of pro- tection provided by the CSP to cloud tenant user data and VM images, as well as other factors.
  • 3. These concerns raise questions. Can the overall security status of a CCS or a CSP offering be assessed using a frame- work that addresses the unique vulnerabilities of CCSs and can such assessments be applied to alternative CCS architec- tures and CSP offerings in an unbiased way? The federal government has issued security controls that CSPs must implement to obtain FEDRAMP CCS security certification [8] that are based on National Institute of Standards and Tech- nology (NIST) cloud security guidelines [1]. However, these do not provide high-level decision-makers with an overall assessment of CCS security status or the degree of confidenti - ality and integrity offered by specific cloud architectures [9]. The main contributions of this paper are to develop a CCS reference architecture and a cloud security assessment model—Cloud-Trust—that provides quantitative high level security assessments of IaaS CCSs and CSPs. Cloud-Trust can assess the relative level of security offered by alternative CSPs or cloud architectures. Cloud tenants can use it to make decisions on which CSP security options or cloud security features to implement. We illustrate the use of Cloud-Trust by applying it to the case where the cloud ten- ant is a U.S. government agency and examine how well four alternative CCS architectures protect U.S. government data. Cloud-Trust is based on CCS unique attack paths that cover the essential elements of an IaaS cloud architecture. It is based on a Bayesian network model of the CCS, the class of APT attack paths spanning the CCS attack space, and the APT attack steps required to implement each attack path. It provides two key high-level security metrics to summarize CCS security status quantitatively: � Probability an APT can access high value data
  • 4. � Probability the APT is detected by cloud tenant or CCS security monitoring systems. The first security metric estimates whether high value data (designated as “Gold” data in this paper) is likely to be compromised or erased from the CCS. The second metric assesses whether the CSP provides cloud tenants sufficient � D. Gonzales, J.M. Kaplan, Z. Winkelman, and D. Woods are with the RAND Corporation, Arlington, VA 22202. E-mail: {gonzales, jkaplan, zwinkelm, dwoods}@rand.org. � E. Saltzman is with the RAND Corporation, Arlington, VA 22202, and The Wharton School, University of Pennsylvania, Philadelphia, PA 19104. E-mail: [email protected] Manuscript received 8 Mar. 2014; revised 1 Nov. 2014; accepted 5 Feb. 2015. Date of publication 30 Mar. 2015; date of current version 6 Sept. 2017. Recommended for acceptance by C. Rong. For information on obtaining reprints of this article, please send e-mail to: [email protected], and reference the Digital Object Identifier below. Digital Object Identifier no. 10.1109/TCC.2015.2415794 IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 5, NO. 3, JULY-SEPTEMBER 2017 523 2168-7161 � 2015 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution
  • 5. requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/i ndex.html for more information. CCS network monitoring, file access, and situation aware- ness data to detect intrusions into a tenant’s cloud network, and whether the tenant’s security and monitoring systems contribute to the intrusion detection. This paper is organized as follows. Section 2 discusses trust zones (TZs). Section 3 presents a cloud reference model and cloud security control features. Section 4 describes CCS unique attack paths and vulnerabilities that can be exploited by APTs. Section 5 describes Cloud-Trust. The final section provides Cloud-Trust results for four alternative cloud archi- tectures, and describes how Cloud-Trust can be used to assess the security capabilities of alternative CSP offerings. 2 PHYSICAL AND VIRTUAL TRUST ZONES We define a trust zone as a combination of network segmenta- tion and identity and access management (IAM) controls. These define physical, logical, or virtual boundaries around network resources. Cloud TZs can be implemented using physical devices, virtually using virtual firewall and switching applications, or using both physical and virtual appliances. IAM systems use usernames, passwords, and access control lists (ACLs), and may use active directory domain controllers [10], Federated Trusts [11], and multifactor authentication mechanisms using time limited codes or X.509 certificates. IAM servers can also use hardware infor - mation to make access decisions. For example, devices with- out a pre-validated MAC address can be prevented from
  • 6. joining a network. Routers using ACLs and IP address white listing can prevent an unauthorized device from accessing network resources. These are examples of hardware based TZ enforcement. An example of a more complex network CCS segmenta- tion scheme is shown in Fig. 1. It uses defense in depth approach to restrict network connectivity to VMs running in a CCS. Both real and virtual network interface cards (NICs) are used to isolate network segments. The network segmentation approach is based on the virtual networking capabilities offered by VMware in their ESX HV [12]. It ena- bles a hybrid strategy that uses both virtual network and physical firewall barriers to protect information in TZs A and B shown in the Fig. 1. Amazon web services (AWS) offers a similar capability called virtual private cloud (VPC) [13]. An APT attack with the goal of exfiltrating data at rest on a resource in TZ B in Fig. 1 must first circumvent the network segmentation and establish network access to the target resource. By staging the attack from a trusted IP address (whitelisted by the firewall(s) protecting that zone), the attacker may gain network connectivity to the target. Assuming the data at rest is encrypted and brute force decryption is not feasible, the attacker must also gain access to the credentials and keys required to decipher the data. This access is typically governed by policies and accounts on the domain controller. Access is granted for legitimate requests from users that have been authenticated and who are authorized. Successfully spoofing these requests, or oth- erwise gaining access to the keys after access has been granted to a legitimate user, would provide the attacker with the ability to decrypt the data. Compromising data from TZ B in Fig. 1 while it is in flight presents different challenges. Data in flight may tran-
  • 7. sit other segments of the network with lower barriers to access for the attacker. For example, if a server in TZ A retrieves data from TZ B, the data is now in this less pro- tected zone, and may be diverted or copied and transmitted over the Internet. If the data is in flight using a protocol that does not guarantee end-to-end encryption such as SOAP, and instead uses point-to-point transport level encryption such as REST over HTTPS, the data will be decrypted at var - ious points in transit, possibly in memory, before it reaches the application layer at the destination endpoint. On the other hand, relying on capturing data in flight makes it much more difficult to compromise the entire dataset. The security of TZ implementations depend on correctly configuring domain controllers, firewalls, routers, and switches that are used in segmenting and restricting access to portions of the cloud network and on “locking down” secure communications between users and domain controllers to prevent SOAP interface or signature wrapping attacks [14]. Misconfiguration of IAM servers, domain controllers and other network devices can introduce vulnerabilities in the cloud network and let attackers enter restricted TZs. Careful configuration management is a key factor that must be taken into account in assessing cloud security status. To ensure such vulnerabilities are not inadvertently created in a CCS well trained system administrators (sys-admins) are needed to set up, maintain, and correctly patch this infrastructure. 3 CCS REFERENCE MODEL AND ARCHITECTURES This work is limited to one cloud deployment model, infra- structure as a service (IaaS) clouds. The layers of the software stack below the Guest OS are under the control of the IaaS CSP: the virtual machine manager (VMM), HV, computing and stor- age hardware, and the CCS network. Only the guest OS that forms the foundation for VMs is assumed under the control of
  • 8. cloud tenants. IaaS cloud tenants provide their own applica- tions and data. The Guest OS may be specified by the CSP policy, or control of the guest OS configuration may be shared between the CSP and cloud tenant. Because of the shared con- trol of the IaaS cloud software stack the security profile and status of the CCS depends on both CSP and tenants. The CCS reference model is shown in Fig. 2. CSP man- agement and security servers are segregated from cloud tenant VMs by subnets, firewalls, domain controllers, and internet access points. Tenant VMs are networked using a software defined network (SDN) shared by all cloud ten- ants. A CSP domain controller controls access to virtual TZs Fig. 1. CCS network segmentation scheme. 524 IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 5, NO. 3, JULY-SEPTEMBER 2017 used by cloud tenants. TZ gold, which contains more valu- able Agency data, is housed within Agency TZ A. This pro- vides multiple access control boundaries to prevent external cloud users, for example from the tenant B TZ, from access- ing data in the Gold TZ. The CSP TZ is segregated from tenant TZs and contains cloud management servers, SDN controller servers, CSP ten- ant IAM servers, and CSP information system security sys- tem (IS3) servers. CSP sys-admins communicate with CSP management systems through a separate firewall and Inter- net port to isolate CSP communications traffic. It is a best practice to isolate CSP management and monitoring systems from cloud tenant VMs, as illustrated in Fig. 2 [15]. Our cloud reference model is based on this best practice and
  • 9. design tenets developed by the Defense Information Sys- tems Agency (DISA) for securing enterprise networks [16]. Early information systems were designed largely to man- age computing resources, apportion costs, and improve performance. As cyber threats grew, enterprise network security capabilities grew in an attempt to keep pace with the threat. Modern firewalls block IP ports and protocols and inspect packets. They also include host-based intrusion detection systems (IDSs), keystroke logging, reverse web proxy servers, DMZs, IAM servers, security incident event managers (SIEMs), and other more exotic detection and pro- tection systems. Network performance monitoring tools, such as Netflow, and log file analyzers are used to identify suspect data flows or configuration changes, and automated software distribution systems rapidly patch OS installations and applications. Cyber security systems have been adapted so they perform similar functions in CCSs, although virtual - ization presents new challenges to both the attacker and defender. We call the cloud systems that detect and prevent the actions of malware and bad actors the information system security system. IS3 systems can generate lots of data and have high false alarm rates. Well-trained sys-admin person- nel are needed to monitor and manage IS3 servers. A cloud IS3 includes IDSs, host based security systems, fire-walls, IAM servers, reverse proxy web servers, syslog servers, and SIEM servers (all capable of functioning effectively in a vir - tual environment). The SIEM aggregates event data pro- duced by security devices, network infrastructures, systems and applications. Event data is combined with contextual information about users, assets, threats and vulnerabilities. The data is normalized, so events, data and contextual infor - mation from disparate sources can be correlated and
  • 10. analyzed for specific purposes, such as network security event monitoring, user activity monitoring and compliance reporting. Fig. 2 shows the location of IS3 servers used by the CSP, the Agency, and other tenants. We assume tenants provide their own IS3s to monitor and manage their TZs. System protection and risk reduction involve numerous actions not performed directly on the CCS. These include physical protection measures, vetting employees, security awareness training, maintaining a vulnerability manage- ment data base, and participating in national vulnerability organizations and fora (e.g., SANS). We do not include employee training or vetting activities in Cloud-Trust, but note they are important for securing CCSs and CSPs. A wide range of options exist for configuring, segment- ing, and applying security controls to a CCS. Many types of security systems can be added. It is the beyond the scope of this paper to enumerate all possible cloud security controls. We focus on a few new promising CCS specific security capabilities. An important security attribute is how CSP sys-admins manage the CCS. We assume management is performed off-site. As described above we assume CSP sys- admins control CSP management servers using a dedicated Internet portal. CSP sys-admin traffic is accepted by the CSP control port firewall and routed to CSP management servers only if the traffic originates from an approved list of IP addresses. CSP management applications are isolated by hosting them on dedicated servers in their own CCS subnet. However, they cannot be completely isolated from tenant VMs, as they must monitor tenant VMs. Fig. 2 shows routers Fig. 2. CCS reference model. GONZALES ET AL.: CLOUD-TRUST—A SECURITY ASSESSMENT MODEL FOR INFRASTRUCTURE AS A
  • 11. SERVICE (IAAS) CLOUDS 525 connecting tenant and CSP management subnets. These subnets can be isolated in hardware by using separate NICs for public and control plane (i.e., management) networking. Table 1 shows four cloud architectures based on the ref- erence model with progressively more security controls. More robust security controls are shaded. All four architec- tures use an SDN for tenant VM networking. The first has a minimal set of security controls. The sec- ond incorporates additional data center physical access, CSP sys-admin authentication, and server hardware port con- trols. In the first architecture any CSP employee can enter the cloud data center. In the second, CSP sys-admins are not permitted in the data center. Employees authorized to enter the data center carry electronic access control cards and their movements are tracked in the data center. CSP sys-admins must use two factor authentication to login to CSP manage- ment servers, and they must sign in as named local users and not as root. Some cloud management products now offer such capabilities [17], which make it easier to identify unauthorized processes running with high privilege levels. The third architecture includes the security controls of the second one and applies these security controls to all Agency sys-admin and regular users. Agency cloud users must login to Agency VMs using time sensitive two factor authentication methods. The fourth architecture includes additional cloud infra- structure hardening measures. VM images are encrypted in storage. VM image store directories are monitored for access
  • 12. attempts, image changes, and TZs are isolated using more robust measures. The HV and (basic input/output system (BIOS) used in the CCS present potential additional points of vulnerability. HVs contain source code also found in an OS and may have large code bases, which means they may contain significant vulnerabilities. New technologies have have been developed to protect HVs and BIOS and to detect unauthorized HV or BIOS tampering. NIST has developed guidance for harden- ing BIOS [18]. Server vendors and microprocessor manufac- turers now provide capabilities to verify CPU authenticity, the unaltered state of key chips on the motherboard, and which can securely measure and store BIOS and software boot time information. These make use of the Trusted Plat- form module (TPM) [19]. TPM has been integrated with the boot time measurement and remote attestation capabilities of Intel and other microprocessors [20]. There are many options to consider in this area. A particular CSP may imple- ment a commercial HV that utilizes all of the security capa- bilities offered by TPM. Or the CSP may choose to not implement any of the security options available for a partic- ular HV, microprocessor, or server. Or the CSP may use a custom designed HV, with its own unique security features. In this case the complete set of HV and server security fea- tures may not be public information. For the sake of illustra- tion we consider only two options in this area. In cloud architectures 1 to 3 we assume a non-signed HV and servers and CPUs without TPM are used. In these cloud architec- tures, the integrity of the BIOS and HV cannot be verified during boot up. Cloud architecture 4 is more secure. All servers in the CCS are assumed to use trusted BIOS (signed BIOS), TPM, and CPUs capable of making secure boot time mea-
  • 13. surements, such as Intel Trusted Execution Technology equipped CPUs [20]. Some HVs, such as VMware’s vSphere 5.1 and later, are available in modular form, with each mod- ule containing a PKI signature that can be independently used to verify boot time and the unmodified state of the software code base during boot up. In the future, protected memory CPUs may have TPM capabilities built into the microprocessor, and may be used to verify the unmodified state of the HV code base dynamically at periodic stages at runtime [21], [22]. Table 1 shows other security attributes of the CCS archi - tectures we consider. One is the degree of isolation of tenant TZs. An important aspect of this isolation is whether cloud users in other TZs can surveil the public portions or private tenant subnets in the cloud beyond their own subnet or TZ. If tenant VM names and IP addresses are readily available within the cloud, a cloud user from outside the Agency may be able to use standard network surveillance tools to iden- tify the names and IP addresses of VMs used by Agency TABLE 1 CCS Architecture Security Controls VM Images At Rest VM Migration CSP Sys-admin IAM Data Center physical security Hypervisor, BIOS, CPU
  • 14. VM Isolation Tenant IAM App. White-listing Cloud Arch 1 Not encrypted Unencrypted memory pages and packets Single factor All CSP employees have access HV, BIOS not signed No network, CPU isolation Single factor No CPU without TPM Cloud Arch 2 Not encrypted Unencrypted memory pages and packets 2 factor—time limited token code CSP employee access
  • 15. limited & controlled þ USB server ports disabled HV, BIOS not signed No network, CPU isolation Single factor No CPU without TPM Cloud Arch 3 Not encrypted Unencrypted memory pages and packets 2 factor—time limited token code CSP employee access limited & controlledþ USB server ports disabled HV, BIOS not signed No network, CPU isolation
  • 16. 2 factor—time limited token No CPU without TPM Cloud Arch 4 Encrypted at rest þ file access moni- toring Encrypted memory pages and packets 2 factor—time limited token code CSP employee access limited & controlledþ USB server ports disabled Signed HV, signed BIOS CPU with TPM Virtual PANs, temporal CPU
  • 17. isolation 2 factor—time limited token Yes 526 IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 5, NO. 3, JULY-SEPTEMBER 2017 users (as may be possible in the Amazon web services cloud if certain security controls are not implemented by the ten- ant [5]). These capabilities have significant security implica- tions, as shown by Ristenpart [5]. A wide range of network configurations is relevant to this security dimension. To make the analysis tractable we consider only two options in this area. The first is when cloud tenants have a wide range of surveillance capabilities at their disposal. The second is when the cloud tenant is not able to conduct surveillance operations across tenant TZs. The second option is adopted only in the fourth cloud architecture. It can be implemente d in a variety of ways. One is by using dedicated hardware, perimeter firewalls, and IDSs to protect the Agency TZs, as is the best practice for securing enterprise networks [16]. However, this reduces cloud flexibility and elasticity. New cloud security technologies, like virtual firewalls and virtual networking using encrypted packets provide similar capa- bilities in a fully virtualized environment. AWS offers a EC2 service called virtual private cloud with these capabilities [13]. VMware offers networking and security capabilities in a product called VxLan [23] to support the isolation of VMs and VM TZs, and has recently received a patent on such capabilities [24].
  • 18. VMs in storage and migration also require protection [25], [26]. If the VM image is altered in storage and compro- mised by malware, an adversary may gain control of the VM even if it is spun up in a highly protected TZ. If an adversary can gain access to a VM when it is stored in mem- ory during migration or to the VM packet stream when the VM is moved, the adversary can obtain crypto keys or other credentials that provide access to sensitive data and applica - tions in the agency TZ [27]. VM images can be encrypted to prevent VM image inspection and compromise. Live VMs could also be protected during migration by encrypting them in memory and during their movement by encrypting VM IP packets. These security controls are part of the fourth cloud architecture, as indicated in Table 1. 4 CCS NODE CLASSES The abstracted view of an IaaS CCS is shown in Fig. 3. It is the starting point for Cloud-Trust, and is based on the types of nodes in a CCS. These are labeled node classes, because many individual nodes of each type or class will be present in the CCS. To simplify the analysis we assume all nodes in each node class are identical in terms of their security properties (before any malware is introduced we assume they are iden- tically configured and that if there are system or node con- figuration errors these are common across all nodes in a node class). Therefore, it is not essential to distinguish between individual elements in each node class, and we can define a Bayesian network model in which the nodes of the network are CCS node classes, and not individual system components of the CCS. This Bayesian network model forms the basis of Cloud-Trust. The columns in Fig. 3 indicate the TZs node classes
  • 19. belong to. The types of nodes classes are indicated in the first column. Node classes reflect the segregation of CSP and tenant network paths. The CCS architecture shown in Fig. 3 also has the feature that VM traffic within a TZ can be confined in that zone and segregated if all intra-TZ message traffic is routed by the V routers. This functionality is consis - tent with SDN or virtual networking capabilities provided by leading HV vendors and CSPs. The attacker’s objective is assumed to be the data store in TZ Gold in the upper left hand corner of Fig. 3. The APT will have to traverse the network of node class objects from bottom to top to gain such access if the attack starts from outside the cloud. Using such node class diagrams, a cyber attack against an IaaS cloud can be represented by a directed graph of edges and nodes. The types node classes included in the node class diagram depend on the specifics of the cloud architecture examined. To find the set of edges that represent technically feasible cyber attacks we investigate specific CCS vulner - abilities identified in the literature. These are used to develop a set of attack paths that span the set of all feasible paths through the CCS infrastructure to the APT target. 5 CCS ATTACK PATHS CCS attacks can be divided into outsider or insider attacks. Outsiders can gain access to the cloud using three attack paths. The first exploits weaknesses in cloud access control mechanisms. Such weaknesses may exist in firewalls or IAM servers used by the CSP or cloud tenants. The second starts by stealing valid credentials of a cloud user at some location outside the cloud (for example from a host inside a government agency). The third outsider attack path starts with the attacker using valid credentials and prior legiti -
  • 20. mate access to the cloud. Insider attack paths start inside the cloud when the attacker already exploits credentials for at least one cloud TZ, for example the CSP TZ. The ingress attack paths we consider are shown in Table 2. The attack paths are defined in two variants. The first we call a “Stuxnet” variant where the APT requires little or no command and control (C2) by the external human attacker. In this case the APT has the surveillance information it needs to conduct all stages of the attack, or capabilities needed to independently do surveillance. The second attack variant is one where the APT has much less capability and information about the CCS environment. In this case we assume it must communicate with an external control authority and be updated with new capabilities during the attack. Fig. 3. CCS node classes. GONZALES ET AL.: CLOUD-TRUST—A SECURITY ASSESSMENT MODEL FOR INFRASTRUCTURE AS A SERVICE (IAAS) CLOUDS 527 The target data that the APT attempts to access in all these attacks is located in a cloud TZ controlled by a govern- ment Agency—TZ Gold (G). We assume Agency users with TZ G access are also able to log into VMs in the Agency’s TZ A. We do not assume that Agency network traffic is not restricted between A and G TZs. We also assume that Agency VMs operating in the same TZ run on the same physical machines and HVs. 5.1 VM CPU Timing Side Channel Attack
  • 21. This attack is based on VM vulnerabilities identified by Ristenpart, et al. [5]. It is representative of a class of attacks that take advantage of VM co-residency, which arises when VMs of two or more users share the same hardware. If the attacker’s VM is co-resident with the target VM it may be able to glean information from the target VM by observing the hardware’s behavior. First the APT obtains access to the cloud and conducts surveillance. If the target is in a public cloud the only barrier to entry is a valid credit card to establish an account. The attacker instantiates VMs as needed to collect information on servers and VMs. To surveill the cloud the attacker will run legitimate code or malware. We define VMs as being co-resident when they operate within the same physical machine and same HV. A variety of techniques can be used to detect and establish co-resi- dency [5]. If the tenant is not guaranteed exclusive use of hardware, the instantiation of a VM that is co-resident with a target VM is generally governed by chance. However, it may still be possible using techniques described by Ristenpart [5] called “Cloud Cartography.” Other co-residency checks use network trace routes. Since the first network “hop” from a VM is its HV, if that HV is configured to report itself when a trace route is conducted, co-residency can be detected using IP addresses. In a similar way, “distance” can be deter - mined by ping packet round trip times. The lower the round trip time, the more likely the VMs are co-resident [5]. If the VM operates an external facing service such as a website, still other load analysis techniques may be feasible estimate co-residency [5].
  • 22. Once co-residency is achieved, the attacker uses a prime- trigger-probe technique to monitor activity on the shared CPU’s cache. The attacker’s goal is to obtain an agency user’s password, which may be done by analyzing an agency user’s inter-keystroke timings [5], [29]. Once credentials have obtained, they are used to directly logon to the target’s VMs. Once inside the agency network, additional surveillance may be conducted to identify and gain access to the targeted Gold data. 5.2 Software Defined Networking Attack This attack exploits potential vulnerabilities in SDNs [30]. Virtual switches are special purpose VMs that may be co- resident with guest VMs on the same HV. Other configura- tions are possible including one where the virtual switch logic and code are integrated with the HV. First, the APT gains access to VMs in a cloud TZ (e.g., TZ B) that are logical and network “peers” to the target VMs. This can be done through legitimate means if the only bar- rier to obtaining a CSP account is payment. With legitimate or stolen credentials, the APT gains regu- lar user access to a TZ B VM. The APT installs malware on the TZ B VM, which enables the APT to control the HV (exploiting a HV vulnerability). Once the HV has been com- promised, the APT is able collect information from the host machine’s RAM such as additional credentials, network architecture, and decryption keys to compromise additional VMs and physical machines as necessary. We assume that credentials obtained for one VM in a TZ can be used on other VMs in the same TZ.
  • 23. The APT obtains credentials to logon to a VM on the machine hosting the VM with access to Gold data. The APT compromises the HV on this machine. This time, the APT uses malware to modify the behavior of the virtual switch. This could include changes to the code in the virtual switch, the routing table, or both, so network packets destined for or emanating from the target (gold TZ) VM are copied and directed to a VM under APT control. Encryption of network traffic within the agency’s virtual enclave could deter such an attack. The APT obtains the targeted information over time by filtering the inbound and outbound network traffic to the target VM. The CSP design pattern that makes this attack possible is putting SDN based VMs co-resident in the same physical machines with cloud tenant VMs. 5.3 VM Attack through the HV This attack starts in much the same way as the SDN attack above. The APT obtains valid government user credentials (through spearfishing, surveillance, or use of malware) that can be used to access a VM operating in the agency’s TZ in the cloud. A related attack path exists in the public cloud. Then the attacker obtains a public cloud account and ini - tiates VMs in TZ B with the objective of compromising the HV and obtaining co-residency with a target agency VM running in TZ A or TZ G. HV compromise proceeds as in the SDN attack. The APT installs malware that exploits a vulnerability in the HV that enables privilege level escalation [31], [32]. Once the HV is compromised, the APT collects data from the host machine’s RAM such as additional credentials, network architecture, and decryption keys to compromise additional
  • 24. VMs and physical machines as necessary. This data is used to locate target VMs and to obtain co-residency. TABLE 2 Cloud Specific Attack Ingress Paths Attack Name Key Node Classes Exploited VM side channel attack Physical machine SDN virtual router Hypervisor, virtual router VM attack through the hypervisor Hypervisor Live VM attack VM Corrupting VM images 1 VM image and VMs Disk injection to Live VM VM VM migration attack 1 Local storage VM migration attack 2 V-router VMM control compromise 1 VMM, V-router VMM control compromise 2 VMM, hypervisor CSP sys admin þ physical access Physical machine, VM Corrupting VM images 2 VMs and VM images Undetected config. modification CSP firewalls, IAM servers Nested Virtualization Hypervisor 528 IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 5, NO. 3, JULY-SEPTEMBER 2017 Once the attacker has successfully executed the above steps and becomes co-resident with the target VM, the APT can extract relevant data from the memory of an operating VM in the Gold TZ and can gain access to Gold data. 5.4 Live VM Attack In this attack we assume each VM has at least one “local”
  • 25. active administrator account. For this is a local username- password account the VM doesn’t seek network validation of the logon. The hashed user name and password—that is targeted by the APT. We also assume all VMs in agency TZ have the same local sys-admin logon accounts. The success of this attack and variations on it are dependent primarily on the agency’s configuration of its VMs. First, the attacker illicitly obtains agency credentials from outside the cloud to gain regular user access to a VM in the Agency’s TZ A. With these credentials, the APT gains regu- lar user access to an agency VM in TZ A. Depending on the tenant’s security configuration, the APT may need to work around additional hurdles such as access via a restricted range of IP addresses (i.e., IP white listing restrictions). We assume for this attack that these additional security controls are not in place. The APT installs malware to extract the file containing the hashed local sys-admin password (such malware would require some form of malicious privilege escala- tion). The APT moves the hashed password file to a loca- tion under its control where it decrypts the password file. Using this local sys-admin password, the APT logs into additional TZ A VMs and installs a key logger to collect additional credentials. The APT repeats this combination of local sys-admin password and key logger exploits until eventually, the APT obtains credentials sufficient to gain access to a VM running in the Gold TZ that has access to gold data. 5.5 Corrupting VM Images 1 In this attack VM images are compromised and used to gain
  • 26. access to agency Gold data [33]. We assume agency refer- ence VM images are stored in the cloud. The success of this attack is dependent on the VM image storage controls used by the CSP and agency. For this attack to be effective VM images images would not be encrypted, no file access moni - toring used, and only single factor authentication would be available to tenants. First, the attacker uses valid (insider) or stolen (outsider) credentials to access the agency’s image store in CCS. These credentials are assumed to grant the intruder access to TZ A and to a shared storage directory accessible by the CSP and agency users with TZ A access credentials. Agency VM images are stored in this shared storage directory. The out- side attacker uses stolen credentials to access and copy one or more agency VM images. The insider would be a CSP sys admin or an Agency sys admin who has access to the shared VM image store. The attacker modifies the VM image to include malware that monitors data accessed by VM. The attacker uses the same agency credentials to insert the modified VM image into the image store. Agency personnel use the infected VM image to instantiate new VMs. The malware on infected images remains dormant for a period of time to avoid trig- gering startup timing alarms. Malware on the VM monitors the data accessed by the VM user. When the Gold data is accessed, the APT uses additional exploits on the target VM to access Gold data. This may involve caching credentials to allow the APT to directly access the VM or to deposit Gold data in local stor- age using previously stolen credentials. 5.6 Disk Injection to Live VM
  • 27. The attacker attempts to gain access to agency Gold data by placing malicious code in the local attached storage of the targeted VM [34]. Necessary pre-conditions for this attack are that the VM in TZ Gold is operating on a physical machine that hosts VMs in other TZs, and the attacker can conduct network surveillance inside the cloud. The APT can then attempt co-residency with the target. Using similar surveillance, pivoting, and compromise steps associated with earlier attacks, the APT gains access to a VM that is co-resident with a target VM operated by the Agency in its gold TZ. In this attack, after the APT logons to a VM co-resident with the target VM, the APT exploits a vulnerability in the HV to compromise it. Using the compromised HV, the APT writes malicious code to the local storage of the target VM. The HV also makes a minor change to the native “root/admin” level job scheduling system of the OS that ensures the malicious code will be called. When the privileged (root/admin level) job is called on the target VM, the malicious code is loaded and run. The malware then beacons its readiness to take fur - ther action by communicating to the APT’s human control- ler. The APT is directed by the attacker to access Agency Gold data. This attack becomes much more difficult if the local stor- age of the VM is encrypted. In such case, both the encryp- tion regime and the HV must be compromised in order to complete the attack. 5.7 VM Migration Attack
  • 28. VMs are migrated or moved frequently in clouds to prevent the overheating of servers and to optimally allocate work- loads to available physical machines and resources. During workload migration VM memory pages including the OS are copied and moved to a new location. This attack takes advantage of the exposure of a VM during VM migration operations in the cloud [27]. Through spearfishing and surveillance, the APT obtains user credentials for a VM operating in cloud tenant B TZ. Using a VM in TZ B the APT monitors network traffic (without additional compromises, this presumes that the VM is receiving and can control the behavior of its virtual or physical NIC to put it into promiscuous mode so that it can capture packets not addressed to it). APT uses VMs in TZ B to capture and filter network traffic. When a live VM transfer is detected, the attacker’s VM stores the associated packets. Useful information is extracted from the captured VM (certificates, credentials, file access information) and is used to compromise additional VMs in other TZs, until the attacker compromises a VM in TZ Gold. At this point the attacker gains access to Agency Gold data. GONZALES ET AL.: CLOUD-TRUST—A SECURITY ASSESSMENT MODEL FOR INFRASTRUCTURE AS A SERVICE (IAAS) CLOUDS 529 5.8 CSP Personnel with Physical Access CSP personnel with physical access to the CSP datacenter can breach security controls by direct access to physical machines. However, the large number of machines compli-
  • 29. cates the task. Precision requires the attacker first identify the hardware hosting the target data. The CSP insider cannot make physical contact with every machine in the datacenter, but he has several methods to locate the machine hosting the agency TZ G VMs. The first is to enumerate all of the Agency’s live VMs. CSP manage- ment servers hold such data. A CSP sys-admin will have access to this data. The list of agency VMs might be very large. The attacker must reduce the list so he can visit each machine. Informa- tion that can help narrow the list is configuration data. This includes security group and other tenant created configura- tions that reveal the topology of the tenants resources in the cloud, specific services that can be assumed based on spe- cific ports that are open, identity and access management data that shows which tenant users have CSP accounts and what they are allowed to do with specific resources, tenant naming conventions for their machine images or instances, and relative memory, disk, CPU, and I/O sizing of various instances. These steps are likely to identify, for example, large machines, which host web server, file share, or data- base processes, and those that have limited access. Once the CSP insider knows which machines to visit, he must map these to the datacenter layout. Datacenters that are segmented or compartmentalized, or keep access to physical and logical maps separate, will complicate the task. In contrast, datacenters that have a single point of entry will make this attack easier. A CSP insider can inject malware using a USB drive. USB ports on physical machines are a well-known vector for inserting malware and ex-filtrating data. These attacks can be instrumented to work in an environment where the user
  • 30. is unprivileged and possibly unaware of the payload. To compromise the target the attacker must induce it to load the malware. Physical machines with protections against ‘autorun’ execution may require additional manipu- lation via a KVM management interface. Such access may require access tokens that would identify the insider, but this depends on how such tokens, including local machine administrator account passwords, are managed. Given the familiarity a CSP insider is likely to have with the software, hardware, and virtualization stack, they may have the option of employing minimally invasive, and therefore hard to detect malware such as an in memory rootkit. Such malware will not be directly detected by disk or network based scans. The malware injected via physical access provides a breach point for the attacker. The breach itself can provide network access and elevated privileges on the HV hosting the target VM. By beaconing to known attacker control nodes, the attacker can establish a link to control the execu- tion of the rest of the attack. 5.9 VM Manager (VMM) Control Compromise CSP sys-admins use VMM capabilities to migrate live VMs, to allow for hardware servicing without execution interrup- tion, or to debug faults using core dumps and memory page snapshots. An attacker can repurpose VMM utilities to com- promise agency data. VMMs can be a privileged VM that runs on top of the HV. The VMM has access to ring 0 privileges and can see other VM’s memory and configuration values. If the attacker gains direct access to the VMM, or is able to corrupt
  • 31. the VMM control channel, they would gain a great deal of maneuverability within cloud infrastructure. Compromising the VMM or VMM control provides the attacker with a path to Agency Gold data by making keys and other sensitive data in an Agency VM visible to the attacker [35]. It also provides the attacker with a mechanism to move resources across TZs, for example by moving mem- ory dumps, machine state, or entire VM instances from one physical machine to another. For example, the attacker could use the VMM to take a memory snapshot of an Agency VM in TZ Gold. The attacker could then proceed to access sensitive access tokens or data. This attack has three key steps: identifying the HV host- ing the target, gaining access to the VMM control channel, and executing a snapshot or memory dump request from the VMM. One path for this attack begins from a compromised node or insider in the CSP enclave. This person, or node would allow the attacker to identify the HV that contained the target VM. Identifying the HV implies identification of the VMM. Other outsider attack paths also exist. Once the target VMM is identified, the attacker acquires the ability to send it valid requests. If the physical machine has a separate network interface card installed to isolate command channel traffic to the VMM, the attacker may need to compromise a CSP enclave node with access to that network. Or a CSP insider with access to a CSP man- agement enclave C2 node can do this if the CSP insider has sys admin privileges. If VMM traffic transits the same NIC as all other traffic to and from the HV, an outside attacker may be able to gain
  • 32. access to and control the VMM from C2 nodes outside of the CSP management enclave. In order for this attack path to be successful the attacker will have to compromise one or more nodes in the cloud network that are in the network path between the target and the CSP management servers in the CSP TZ. If management function requests are run using a protocol that does not require authentication, network access to the control channel gained in the previous step might be the only requirement for successfully dumping the memory of the tar- get VM. Otherwise, a credential may need to be compro- mised. If this is the case, the insider or compromised node in the CSP enclave could be used to surveil the host and network for valid credentials. The attacker establishes a destination for the memory dump, presumably outside the Agency’s TZ. The attacker sends a message to the VMM managing the target VM instructing it to dump its memory into a location in TZ B. The attacker examines the memory dump and iden- tifies needed credentials to access agency Gold data, or finds the Gold data directly in memory. 5.10 Corrupting Agency VM Images 2 VM images and instances are vulnerable to attacks from the time they are created, during their transfer to the CSP, 530 IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 5, NO. 3, JULY-SEPTEMBER 2017 in storage in the cloud, while running, and when they are migrated within the cloud. Any unauthorized access or manipulation of VM image file can undermine trust in it.
  • 33. Infecting images can be more damaging than ‘stealing’ them because instances based on the infected image will continue to process sensitive data and may expose it to fur- ther exploitation. Integrity checks that are both stringent and regularly performed can provide some assurance regarding the health of the image, but such checks can be defeated. Modifying a startup script in a VM image provides a sim- ple example of how an attacker can gain control of a VM. Adding just a few commands can open a backdoor (i.e., exploit a vulnerability in the OS) or send a beacon signal to the attacker’s command and control infrastructure. The attacker can then connect to the VM and continue to the next phases in the attack. Because the attack is inserted into the startup routine, it will run every time a VM instance based on infected image is spun up. VM instances are also susceptible to manipulation. Implementing this attack requires three steps: gaining access to the CCS, modifying images or instances while avoiding integrity check violations, and creating a beacon that indicates successful compromise of a live VM. Attacks that exploit vulnerabilities of networked devices may also apply to CSP management servers. An APT could use spearfishing, surveillance, and installation of malware to gain access to a physical machine and sys-admin account credentials in the CSP enclave providing them with a com- mand and control (C2) node and network access to cloud management servers in the cloud that host dormant VM images and instances. From the C2 node, the CSP enclave can be surveilled for the target: physical machines hosting the agency VM images and instances can be infected. Once found, the C2
  • 34. node can be used to access the target and establish the abil - ity to read and write from the VM images and instances. At this point a second APT package can be injected into the agency VM image or instance. The C2 node can also be used to access and manipulate or defeat the aforemen- tioned integrity checks by replacing hash values, or causing hash collisions. When an authorized agency user requests the VM image or instance be spun up, integrity checks are circumvented and the modified startup scripts are run activating backdoor and beaconing malware. The activation of the beacon and backdoor can be scheduled to run at a later time or made to run so quickly such that the deviation from a baseline startup time may not be noticeable. The attacker can use the backdoor on the infected VM to install additional malware if required. The attacker waits for a compromised VM to be started by an authorized user with TZ Gold credentials. When this occurs the attacker has network access and elevated privileges on the target VM to access Agency Gold data. This attack can be defeated by encrypting Agency VM images stored in the CCS and ensuring cryptographic keys are controlled by the Agency and not the CSP. There are a number of ways of implementing a secure key managment system for CSPs. One approach has been developed by Tysowski and Hasan [46]. 5.11 Undetected Configuration Modification Restricting traffic to a single whitelisted IP address associate with an agency enclave is a common baseline security con- trol-best practice for limiting access to resources provi - sioned in the cloud. This, in theory limits access to the cloud
  • 35. resources to traffic emanating from the agency enclave, but it does not extend all agency enclave protections and moni - toring to agency resources in the cloud (for example, an IDS may be absent in the cloud, and the CSP SIEM may not receive data from firewalls protecting Agency TZs). There- fore, the agency has less situational awareness regarding activity on its cloud based resources than it does within its enclave. This may allow the attacker to obtain access to sen- sitive data in the cloud. Typically the CSP will provide an implementation of this control to agency users. For example: defining security groups for particular VMs. Permissions to create, modify and remove these configurations are granted to agency users with CSP accounts according to agency provisioning using the CSP’s IAM schema. For example: agency user A is allowed to create VMs and set security groups, agency user B is allowed to start and stop instances but cannot create them or modify their configurations. In order to modify the security group configuration and whitelist IP address corre- sponding to its C2 nodes, the attacker need only gain access to the CSP credentials for agency user A. Whitelisting an additional IP address for an APT C2 node outside the agency’s enclave allows the attacker to user the credentials it has acquired from inside the agency’s enclave to access the agencies resources in the cloud without any of the agencies monitoring tools detecting the access. If the CSP does not notify the agency that a configuration change has been made, and the attacker restores the original config- uration after the access is complete, the agency may never learn of the access. This attack has three steps: obtaining credentials for agency CSP resource configuration modifications and for agency A and G TZ access; modification of agency CSP
  • 36. resource configurations to white list the IP address of the attacker’s C2 node; and access of agency Gold data from the newly whitelisted enclave. The attack begins by compromising a node within the agency’s enclave via spear phishing or other methods. This node allows the attacker to perform surveillance that subse- quently yields a valid credential being used by agency users to access a resource on an agency VM in the gold TZ, as well as a valid credential for an agency user with the author - ity to modify configuration of agency CSP resources. Once the attacker has an agency user’s credential for modi- fying configurations it may be able to use this credential from nearly anywhere because this access may not confined to whitelisted IP addresses. Once it logs into the CSP manage- ment interface and adds an additional IP address to the agency’s Gold VM whitelist this task is complete. An addi- tional step to cover its tracks after the attack is complete might involve reverting the configuration to its original setting. Armed with the VM access credential obtained in the first step, and a network path from its C2 node outside the agency’s enclave, the attacker can proceed with essentially unmonitored access to the agency’s VM using legitimate credentials. GONZALES ET AL.: CLOUD-TRUST—A SECURITY ASSESSMENT MODEL FOR INFRASTRUCTURE AS A SERVICE (IAAS) CLOUDS 531 5.12 Nested Virtualization A nested virtualization attack [36] uses an additional unau-
  • 37. thorized HV to access sensitive data and credentials. The additional HV could be inserted either between the normal HV and the physical hardware, or between a guest OS and the normal HV. In the former case, the additional HV will provide an attack surface that spans all of the VMs on the original HV. In the later case, the additional HV could be confined to a specific guest OS. The target for the attack is a VM running in TZ G or is a VM image with stored TZ G credentials that is at rest. Find- ing the VM image at rest, or finding the physical machine that the target VM is or will be spun up would be accom- plished by surveillance of Agency VM operations. Either target is likely to begin with the attacker gaining access to the CSP management enclave in order to perform sufficient surveillance. An insider working for the CSP can do the surveillance. Attacking the VM image and inserting the unauthorized HV provides the advantage that the operation can be per- formed before the image is loaded into the CSP infrastruc- ture (while it is still in the agency enclave). Targeting the image at rest, the attacker would ‘wrap’ it with an additional HV (which would boot up first). Targeting the physical machine would require that the attacker either be able to reboot the machine and cause it to load the attacker’s HV first, and then load the CSP’s HV, or implement a ‘blue pill’ rerouting of a live HV without rebooting [36]. Once an attacker has successfully nested a HV at either layer, one of the main advantages, in addition to gaining access to memory and other sensitive resources, is that the rest of the stack would function ‘normally’. The guest VMs continue to run on virtualized infrastructure, and the origi - nal HV thinks it is running on CSP hardware.
  • 38. Once the attacker has succeeded in injecting a HV that it controls, it has gained a stealthy point of access to sensitive VM data and credentials. However, unless the attack is completely autonomous, it may require additional surveil - lance and C2 activities. The HV may therefore have to bea- con to another node to complete the attack. Nested virtualization attacks exploit the fact that both the intended hosts and guests might not have mechanisms available to verify the other parties. The guests are sup- posed to run on a virtualized platform and may not be able to detect that they are not running directly on a CSP sanc- tioned HV. Similarly, both the CSP HV and the CSP hard- ware provide interfaces that do not discriminate between consumers of their resources. Absent specific restrictions, an additional attacker controlled HV could be a consumer that is as accepted as a guest OS, or CSP controlled HV. 6 BAYESIAN NETWORK MODEL We apply Bayesian network statistics to the attack paths described above. Attack paths have been used to under- stand the vulnerability status of information systems [37]. They have also been used to develop probabilistic measures of enterprise network security [38], [39]. We extend this approach to CCSs by constructing an acyclic directed graph using the attack paths defined above [40]. We apply these attack paths to the CCS node classes defined in Fig. 3. The resulting directed graph is shown in Fig. 4. Cloud-Trust relies on conditional probabilities that repre- sent the probability that a vulnerability in an individual CCS component can be exploited by an APT, if other CCS components have already been compromised.
  • 39. These conditional probabilities correspond to the directed edges shown in Fig. 4. This approach enables us to factor in the contributions that specific CCS security features can have in reducing the vulnerabilities of nodes in the CCS and which then can contribute to a reduction in the overall security profile of an IaaS cloud. Our model of CCS architectures includes the security features and con- trols the CSP provides, what the CSP permits the customer or cloud tenant to provide, and what the cloud tenant actu- ally provides. The complete security model consists of two Bayesian sub-networks: an infiltration sub-network and an exfiltra- tion sub-network. Only the Cloud-Trust infiltration sub-net- work is shown in Fig. 4. The infiltration sub-network characterizes the probability that an APT will be able to access the gold data, while the exfiltration network charac- terizes the likelihood that the APT can exfiltrate the accessed gold data. We assume the two sub-networks are independent, i.e., the infiltration strategy is independent of the exfiltration strategy employed by the attacker (In a sub- sequent paper we will examine the relationships of infiltra- tion and exfiltration strategies and will extend Cloud-Trust to exfiltration networks). We denote the infiltration Bayesian network BIN ¼ GIN; � Q INÞ, where GIN is a directed acyclic graph with nodes that are random variables and links that are direct dependencies between those random variables. Let V IN ¼ Aif gni¼1 be the sequence of random variables representing the nodes of
  • 40. V IN such that binary random variable Ai denotes whether node i 2 1; . . . ; nf g has been accessed by an APT to infiltrate the gold data. Furthermore, defining aij ¼ Pr AijAj � � as the probability that node i is accessed by the APT given that nodej is accessed by the APT, we can define the link set as Fig. 4. IaaS CCS infiltration Bayesian sub-network. 532 IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 5, NO. 3, JULY-SEPTEMBER 2017 LIN ¼ fði; jÞ : aij > 0; i; j 2 1; . . . ; n; i 6¼ jg. Observe that the link set LIN gives the nodes between which an APT can tra- verse with positive probability. Since GIN is a directed graph, we must have that aij 6¼ aji. A consequence of the acyclic property is that either aij ¼ 0 or aji ¼ 0. The compo- nent QIN represents the set of quantitative parameters in the network; for each parameter ui 2 QIN for i ¼ 1; . . . ; n, we have that ui ¼ PrðAijpiÞ, where pi ¼ fAj : aij > 0g. In other words, the set pi is the set of parents of node i or the set of nodes from which an APT can access node i with posi - tive probability. Note that we will make the Markov assumption that the random variable Ai depends only on its parents pi, i.e., the access of a node i depends only on which node j it was accessed by the APT and not the history of how the APT accessed node j. While the above exposition characterizes the (unop-
  • 41. posed) attack carried out by the APT, the SIEM has an opportunity to detect the APT’s attack. Hence, we define the binary random variable DINi indicating whether the SIEM detects an APT access of node class i ¼ 1; . . . ; n indi - cating whether the SIEM detects an APT exfiltrating data through node class i ¼ 1; . . . ; n. If we let A denote the event that the gold data has been accessed by the APT and unde- tected by the SIEM, we can calculate the probability of undetected access as PrðAÞ ¼ 1 � Yn i¼1 1 � PrðAjAiÞ � PrðAiÞ � � 1 � Pr DINi � ��� � ; where the probability that node class i has been accessed is given by Pr Aið Þ ¼ 1 � Yn j¼1;i 6¼j 1 � Pr AijAj � � Pr Aj � �� �
  • 42. ¼ 1 � Yn j¼1;i 6¼j 1 � aij � Pr Aj � �� � for i ¼ 1; . . . ; n. We assume that Pr A1ð Þ ¼ 1, i.e., the APT accessing the enclave node class is taken as given. Hence, we have a system of n equations and n unknowns , i.e., Pr A2ð Þ; . . . ; Pr Anð Þ; PrðAÞ. Since the Bayesian network is acyclic, solving this system is algebraically simple using substitution. Our model can also estimate the probability that the SIEM and associated IS3 systems will detect an attack that would infiltrate the gold data. Let DIN be a binary random variable indicating whether the SIEM detect an attack that would infiltrate the gold data. Then Pr DIN � � ¼ Pr A j nodetectionð Þ � PrðAÞ PrðAÞ ; where PrðAjno detectionÞ is the probability that the APT can infiltrate the gold data without any detection (i.e., Pr DINi � � ¼ 0 for i ¼ 1; . . . ; n. The above equation shows what percentage of attacks that would otherwise be successful in infiltrating the gold data can be detected.
  • 43. Although mathematically simple, our Bayesian network approach imposes constraints on how APT attacks can be represented. We have assumed the Markov property when defining the conditional probabilities. In some attacks it may be necessary to return to previously compromised nodes to proceed with the attack. In our mathematical formalism this type of circular path is forbidden. We account for such a pos - sibility and for the possibility that an attacker may have to traverse the ingress path more than once, by including a probability of APT “beacon success” at nodes where addi - tional attack software code or APT commands are needed. This eliminates cycles in the infiltration attack graph. In general, it is possible to expand the node set to allow for attack path histories to influence the probability of node access; however, the tractability and insight that could be gleaned from the model output might be hampered. Using a similar approach, we could also remove the assumption that the infiltration and exfiltration processes are indepen- dent, but it’s not clear that such complexity would add value to the model. 7 ILLUSTRATIVE CLOUD-TRUST RESULTS To apply the model conditional probabilities are needed for all network edges—the probability that given the APT has access to the starting node of the edge, the APT will be able to exploit a vulnerability, conduct surveillance and identify, or obtain co-residency with the target node at the end of the edge. Over 50 probability scores are needed to fully characterize the Cloud-Trust infiltration Bayesian net- work for a typical cloud architecture. For the illustrative cloud architecture assessments presented in this paper over 400 probability score inputs were estimated using a
  • 44. variety of methods. Below we describe how some of these estimates were made. The scope of Cloud-Trust does not include the security measures used in external network enclaves. So we assume that an APT can gain access to relevant external network enclaves and to cloud credentials stored there. For some attack paths the attacker obtains initial cloud TZ credentials by legitimate means. This is the initial step of the VM side channel attack. In this case the attacker has a legiti - mate public cloud account that enables him to instantiate a VM in the public cloud in TZ B. The second step in this attack is to move from a VM in TZ B to be co-resident with the tar- get VM in TZ Gold. As described earlier in the attack narra- tive there are various mechanisms that can be used in public clouds to conduct surveillance and to move a VM into a pref- erential location in the cloud so the attacker becomes co-resi- dent with the target. We assess the success of these methods for specific cloud architectures using two probability scores p_s and p_cr. The value of these probabilities estimates, shown in Table 3, are derived from the literature that applies to different public cloud offerings [5], [14], [13]. We do not estimate the probability that a specific HV will have exploitable vulnerabilities. Instead, we consider a generic HV. HVs are large code bases that resemble OS ker- nels, so we assume the probability is high that an unsigned HV contains vulnerabilities. On the other hand, if the HV is signed and trusted boot time measurements are available from the manufacturer we reduce this probability signifi- cantly as indicated in the table (in other words we assume the HV still has vulnerabilities, but during a reboot they will be detected and a “pristine” version of the HV can be re-installed from a Gold Disk.
  • 45. GONZALES ET AL.: CLOUD-TRUST—A SECURITY ASSESSMENT MODEL FOR INFRASTRUCTURE AS A SERVICE (IAAS) CLOUDS 533 The discussion above illustrates the types of probabilities used in our approach: one, probabilities which represent the likelihood that a particular type of activity can be accomplished in the cloud (that is whether cloud security controls are present or absent which would constrain or eliminate the activity); two, probabilities that reflect the like- lihood the attacker can gain access to one or more cloud resources (e.g., whether IAM controls are in place to restrict attacker access); and three, the probability that a specific type of cloud component contains a vulnerability or prop- erty which can be exploited by the attacker to maneuver to or gain access to another cloud component. In many cases such probabilities cannot be determined precisely by analyt- ical means. For example, all vulnerabilities that are present in a HV may not be known. In cases were there is significant uncertainty in a vulnerability value, we assign one of five values to the conditional probability: very high (set equal to 1), high (set equal to .9), medium (set equal to one half), low (set equal to .1), and very low (.01). We estimate probabili - ties of APT detection for each node class in the cloud archi- tecture using a similar approach. There is also uncertainty regarding specific conditional detection probabilities. In these cases we also estimate the probabilities of detection on a five level scale. Based on reports available in the open press on the extent and longevity of APT attacks we do not ascribe high detection probabilities to most edges in the Bayesian network [41], [28], [42]. An alternative means to determine conditional attack probabilities is to use the common vulnerability scoring sys-
  • 46. tem (CVSS) [43]. CVSS scores associated with specific CCS components could be used to estimate these conditional probabilities. Such an approach would resemble that sug- gested by earlier authors [38]. Illustrative Cloud-Trust results are shown in Table 4 for the cloud architectures defined in Table 1. The cloud archi - tectures with more capable security controls are estimated to have lower probability of successful APT infiltration. Not surprisingly, if the APT is detected prior to gold data access, the probability of infiltration is reduced. This effect is most pronounced in cloud architectures 3 and 4, which have more robust security controls. However, one can see that even with robust security controls, the estimated probability of APT or threat detection are less than or equal to 1/2 in all cases. The estimated cumulative APT detection probability is � 1/2 in architectures 3 and 4 because the individual APT detection probabilities for individual CCS components are estimated to be small (with the exception of file access monitoring of the Agency Gold data store in TZ G) and because file access monitor - ing may not provide an effective APT detection capability if the APT accesses TZ Gold using valid stolen credentials. Cloud-Trust accounts for this possibility in the overall assessments scores given above. Cloud architecture 4 has the lowest probability of APT infiltration. This architecture makes extensive use of encryp- tion to protect VM images at rest and live VMs during migration. It also uses a signed HV, and robust sys-admin access control methods to verify the identity of both CSP sys-admins and Agency cloud users. These security controls make it more difficult for the APT to steal valid credentials and obtain a long lasting presence in key CCS components, such as the HV. If the HV or BIOS are modified by the APT,
  • 47. there is a good chance the HV modification will be detected (especially if the APT is a complex and large code base), even if the APT itself can not be detected. The compromised HV or BIOS can then be deleted, and a “pristine” version of the HV can be re-installed from a Gold Disk. 8 CONCLUSION We have demonstrated how Cloud-Trust can assess the security status of IaaS CCSs and IaaS CSP service offerings, and be used to estimate probabilities of APT infiltration and detection. These quantify two key high level security met- rics: IaaS CCS confidentiality and integrity. Cloud-Trust can also quantify the value of specific CCS security controls (including optional security features offered by leading commercial CSPs). It can also be used to conduct sensitivity analyses of the incremental value of adding specific security controls to an IaaS CCS, when there is uncertainty regarding the value of a specific security control (which may be optional and increase the cost of CSP services, or which may not be required by industry or government standards). 8.1 Potential Next Steps The scope of initial version of Cloud-Trust is currently lim- ited to IaaS CCSs and CSPs. It also does not include all pos- sible insider attack vectors and methods. Possible next steps are to extend Cloud-Trust to include the full range of insider attacks, and to platform as a service (PaaS) and software as a service (SaaS) CSPs. TABLE 3 Selected Cloud-Trust Probability Scores Attack Step Cloud Arch 1 Cloud Arch 2 Cloud Arch 3 Cloud Arch 4
  • 48. 1 TZ B Access from Tenant B enclave 1 1 1 1 2a Establish co-residency—surveillance (p_s) 1 1 1 .1 2b Establish co-residency—VM movement (p_cr) 0.5 0.5 0.5 .01 3 Obtain credentials (varies by attack) 0.1 0.1 0.01 .01 4 Exploitable hypervisor vulnerability 0.9 0.9 0.9 .01 TABLE 4 Cloud-Trust Assessment Results Cloud Arch. Infiltration Probability with APT Detection Infiltration Probability without APT Detection Detection Probability (APT accesses gold data) 1 0.89 0.99 0.1 2 0.84 0.98 0.14 3 0.25 0.46 0.46 4 0.004 0.007 0.5 534 IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 5, NO. 3, JULY-SEPTEMBER 2017
  • 49. It would also be useful to develop a full set of data exfil - tration APT attack steps that span the space of potential CCS and CSP data exit routes. It would be useful to explore how CVSS data could be used to estimate APT attack proba- bilities. A robust sensitivity analysis could also be per - formed using an enhanced version of Cloud-Trust that includes insider attacks to see which CCS nodes and attack paths present the greatest vulnerabilities and advantage to attackers. ACKNOWLEDGMENTS This work was supported by the Institute of information and infrastructure protection (I3P), the Department of Homeland Security (DHS) National Cyber Security Division, and the RAND Corporation, and was performed under DHS contract #2006-CS-001-000001. The authors thank Inette Furey of DHS and Martin Wybourne of Dar- mouth College for sponsoring this research and Richard George (Johns Hopkins University Applied Physics Labora- tory), Dr Shari Pfleeger (Dartmouth University), and Kartik Gopalan (Binghamton University (SUNY)) for useful con- versations. Dan Gonzales is the corresponding author. REFERENCES [1] W. Jansen and T. Grance, “Guidelines on security and privacy in public cloud computing,” NIST Spec. Publ. 800–144, National Institute of Standards and Technology, Gaithersburg, MD 20899, Dec. 2011. [2] P. Mell and T. Grance, “The NIST definition of cloud computing,” NIST, Gaithersburg, MD, USA, Tech, Rep. SP 800-145, 2011.
  • 50. [3] P. Jamshidi, A. Ahmad, and C. Pahl, “Cloud migration research: A systematic review,” IEEE Trans. Cloud Comput., vol. 1, no. 2, pp. 142–157, Jul.–Dec. 2013. [4] L. Vaquero, L. Rodero-Merino, and D. Mor�an, “Locking the sky: A survey on IaaS cloud security,” Computing, vol. 91, no. 1, pp. 93– 118, Jan. 2011. [5] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud: Exploring information leakage in third- party compute clouds,” in Proc. 16th ACM Conf. Comput. Commun. Secu- rity, 2009, pp. 199–212. [6] A. Sood and R. Enbody, “Targeted cyber attacks-a superset of advanced persistent threats,” IEEE Security Privacy, vol. 11, no. 1, pp. 54–61, Jan./Feb. 2013. [7] B. Krekel, “Capability of the people’s republic of china to conduct cyber warfare and computer network exploitation,” U.S.-China Economic and Security Review Commission, Northrop Grumman Corp., DTIC Document, 2009. [8] FedRAMP Security Controls, Federal Chief Information Officer’s
  • 51. Council [Online]. Available: http://cloud.cio.gov/document/ fedramp-security-controls, 2014. [9] S. Zevin, Standards for Security Categorization of Federal Information and Information Systems, DIANE Publishing, 2009. [10] M. Walla. (2000, May). Kerberos Explained [Online]. Available: http://technet.microsoft.com/en-us/library/bb742516.aspx [11] Microsoft. (2005, Aug. 22). Federation trusts [Online]. Available: http://technet.microsoft.com/en-us/library/cc738707(v¼ws.10). aspx [12] VMWare. (2009). Network segmentation in virtualized environ- ments, BP-059-INF-02-01 [Online]. Available: http://www. vmware.com/files/pdf/network_segmentation.pdf [13] Amazon Web Services, AWS j Amazon Virtual Private Cloud (VPC)—Secure Private Cloud VPN [Online]. Available: http:// aws.amazon.com/vpc:/, May 2015. [14] J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “All your clouds are belong to us: security anal- ysis of cloud management interfaces,” in Proc. 3rd ACM Workshop Cloud Comput. Security Workshop, 2011, pp. 3–14. [15] V. J. Winkler, Securing the Cloud: Cloud Computer Security Techni-
  • 52. ques and Tactics. Amsterdam, The Netherlands: Elsevier, 2011. [16] Network Infrastructure Technology Overview, Version 8, Release 3, Defense Information Systems Agency, Aug. 27, 2010. [17] G. Keeling, R. Bhattacharjee, and Y. Patil, Beyond the hypervisor: Three key areas to consider when securing your cloud infrastruc- ture platform. presented at the VMWorld 2012 [Online]. Avail- able: http://www.vmworld.com/docs/DOC-6257 [Accessed: 29- Oct-2014]. [18] A. Regenscheid. (Jul. 2012). BIOS Protection Guidelines for Serv- ers (Draft), 800–147B [Online]. Available: http://csrc.nist.gov/ publications/drafts/800–147b/draft-sp800–147b_july2012.pdf. [19] Trusted Computing Group, Trusted Platform Module (TPM) Sum- mary [Online]. Available: http://www.trustedcomputinggroup. org/resources/trusted_platform_module_tpm_summary, May 2015. [20] S. Chalal, T. Kohlenberg, M. Kumar, S. Mancini, D. Morgan, S. Purcell, A. Ross, and C. Smith, (2010, Aug.). Evolution of integrity checking with intel� trusted execution technology: An intel IT perspective Intel [Online]. Available: http://www.intel.com/con- tent/dam/doc/white-paper/intel-it-security-trusted-execution- technology-paper.pdf [21] M. Hoekstra (2013, Sep. 26). Intel� SGX for Dummies (Intel� SGX
  • 53. Design Objectives) j Intel� Developer Zone [Online]. Available: http://software.intel.com/en-us/blogs/2013/09/26/protecting- application-secrets-with-intel-sgx [22] F. McKeen, I. Alexandrovich, A. Berenzon, C. Rozas, H. Shafi, V. Shanbhogue, and U. Savagaonkaret, “Innovative instructions and software model for isolated execution,” in Proc. 2nd Int. Workshop Hardware and Architectural Support Security Privacy, ACM, 2013. [23] T. Huber. (2013, Sep. 17). VXLAN—What it is, components that make it work, and benefits j VMware SMB blog—VMware blogs [Online]. Available: http://blogs.vmware.com/smb/2013/09/ vxlan-what-it-is-components-that-make-it-work-and-benefits. html, Dec. 2013. [24] W. Lambeth, B. A. Dalal, J. Deianov, and J. Xiao, “Private allocated networks over shared communications infrastructure,” U.S. Pat- ent 8619771. [25] D. Perez-Botero. (2011). A brief tutorial on live virtual machine migration from a security perspective. Princeton, NJ, USA: Prince- ton Univ. [Online]. Available: http://www.cs.princeton.edu/ �diegop/data/580_midterm_project.pdf [26] M. Hines, U. Deshpande, and K. Gopalan, “Post-copy live migra- tion of virtual machines,” ACM SIGOPS Oper. Syst. Rev., vol.
  • 54. 43, no. 3, Jul. 2009. [27] M. I. Gofman, R. Luo, P. Yang, and K. Gopalan, “SPARC: A secu- rity and privacy aware virtual machine checkpointing mecha- nism,” in Proc. 10th Annu. ACM Workshop Privacy Electronic Soc., 2011, pp. 115–124. [28] Mandiant, “M-Trends 2010: The advanced persistent threat,” Mandiant, [Online]. Available: https://www.mandiant.com/ resources/mandiant-reports/, 2010. [29] D. X. Song, D. Wagner, and X. Tian, “Timing analysis of key- strokes and timing attacks on SSH,” in Proc. USENIX Security Symp., 2001, vol. 2001. [30] J. Fortes, “Cloud computing security: What changes with soft- ware-defined networking?” presented at the ARO Workshop Cloud Security, George Mason University, Fairfax, VA, Mar. 11, 2013. [31] M. J. Schwartz. (2012, Jun. 13). New virtualization vulnerability allows escape to hypervisor attacks—informationweek [Online]. Available: http://www.informationweek.com/security/risk- management/new-virtualization-vulnerability-allows-escape-to- hypervisor-attacks/d/d-id/1104823 [32] E. Ray and E. Schultz, “Virtualization security,” in Proc. 5th Annu.
  • 55. Workshop Cyber Security Inform. Intell. Res.: Cyber Security Inform. Intell. Challenges Strategies, 2009, p. 42. [33] T. Katsuki. (2012, Aug. 20). Crisis for windows sneaks onto virtual machines [Online]. Available: http://www.symantec.com/con- nect/blogs/crisis-windows-sneaks-virtual-machines [34] F. Breedijk. (2009, Jul. 31). Blackhat talk: Cloudburst— VMWare guest to host escapes by Kostya Kirtchinsky [Online]. Available: http://www.cupfighter.net/index.php/2009/07/blackhat-cloud- burst-vmware-guest-to-host-escape:/ [35] Homeland Security News Wire. (2011, Aug. 22). Japanese pharma- ceutical crippled by insider cyberattack, Homeland Security News Wire [Online]. Available: http://www.homelandsecuritynews- wire.com/japanese-pharmaceutical-crippled-insider-cyberattack GONZALES ET AL.: CLOUD-TRUST—A SECURITY ASSESSMENT MODEL FOR INFRASTRUCTURE AS A SERVICE (IAAS) CLOUDS 535 [36] J. Rutkowska and A. Tereshkin, “Bluepilling the xen hypervisor,” presented at the 2008 Blackhat Conf., Las Vegas, NV, USA, Aug. 2008. [37] J. O. Sheyner, S. J. Haines, R. Lippmann, and J. M. Wing,
  • 56. “Automated generation and analysis of attack graphs,” in Proc. IEEE Symp. Secur. Priv., 2002, pp. 273–284. [38] A. Singhal and X. Ou, Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs, Nat. Inst. Sci. Technol., Gaithers- burg, MD, USA, Nat. Inst. Sci. Technol. Interagency Rep. 7788, Aug. 2011. [39] M. Frigault, L. Wang, A. Singhal, and S. Jajodia, “Measuring network security using dynamic Bayesian network,” in Proc. 4th ACM Workshop Quality Protection, 2008, pp. 23–30. [40] I. Ben-Gal, “Bayesian networks,” Encycl. Stat. Qual. Reliab. Mar. 2008, Available at the Wiley online library: http://onlinelibrary. wiley.com/doi/10.1002/9780470061572.eqr089/pdf [41] C. Glyer and R. Kazanciyan, “The ‘Hikit’ Rootkit: Advanced and persistent attack techniques (Part 2),” [Online]. Available: https://www.mandiant.com/blog/hikit-rootkit-advanced-per- sistent-attack-techniques-part-2/, Aug. 2012. [42] D. Alperovitch, Revealed: Operation Shady RAT, McAfee. (2011) [Online]. Available: http://noramintel.com/wp-content/ uploads/2011/08/McAfee-wp-operation-shady-rat.pdf [43] P. Mell, K. Scarfone, and S. Romanosky. (2007, Jun.). CVSS v2 Complete Documentation [Online]. Available: http://www.first. org/cvss/cvss-guide.html
  • 57. [44] H. Thimbleby, S. Anderson, and P. Cairns, “A framework for modelling Trojans and computer virus infection,” Comput. J., vol. 41, no. 7, pp. 444–458, Jan. 1998. [45] K. Ingols, M. Chu, R. Lippmann, S. Webster, and S. Boyer, “Modeling modern network attacks and countermeasures using attack graphs,” in Proc. Annu. Comput. Security Appl. Conf., 2009, pp. 117–126. [46] P. K. Tysowski and M. A. Hasan, “Hybrid attribute- and re- encryption-based key management for secure and scalable mobile applications in clouds,” IEEE Trans. Cloud Comput., vol. 1, no. 2, pp. 172–186, Jul.–Dec. 2013. Daniel Gonzales received the BS degree in physics from Stanford University in 1979, and the PhD degree in theoretical physics from MIT in 1985. His research includes command, control (C2) and communications and intelligence sys- tems, information assurance (IA), and cloud com- puting. He has examined performance, testing, and strategy issues for enterprise computing systems, radios, biometrics systems, cloud com- puting, and electronic warfare (EW) systems for the US Army, US Navy, DHS, and the Office of the Secretary of Defense. He is a member of the IEEE. Jeremy M. Kaplan received the BA degree in physics from Columbia College in 1967 and the PhD degree in physics from Columbia University in 1976. He is a private consultant and RAND adjunct
  • 58. staff member. He researches information system security. At the Defense Information Systems Agency (DISA), he led development of architec- ture, systems engineering, test, and communica- tions planning for DoD nuclear C2. He received the Presidential Rank Award of Meritorious Executive in the Senior Executive Service. He has also cre- ated leading-edge concepts for the dynamic modeling of networks. Evan Saltzman received the BS degree in math- ematics and economics from the College of Wil- liam and Mary and the MS degree in operations research at Georgia Tech. He was at RAND from 2010 to 2014. He has examined supply chain and workflow management systems, and was an adjunct faculty member in the School of Manage- ment at George Mason University. Prior to joining RAND, he was an ORISE fellow at the Centers for Disease Control and Prevention (CDC). Zev Winkelman received the BS degree in computer engineering from the University of Michigan, the MS degree in Criminal Justice from the John Jay College of Criminal Justice, and the PhD degree in public policy from US Berkeley. He is on the faculty of the Pardee RAND Gradu- ate School and researches big data analytics, social media, and cyber security. He has more than 15 years of experience in computer engineering and software development. He has implemented systems that allow analysts to fuse, analyze and visualize datasets across multiple domains.
  • 59. Dulani Woods received the BS degrees in mechanical engineering and marine engineering/ naval architecture from the US Coast Guard Academy, and the MS degree in agricultural eco- nomics from Purdue University. He is a data ana- lyst and a modeler at RAND. His research has included assessing design tradeoffs for a fleet of offshore patrol cutters for the US Coast Guard. He served as a Coast Guard Officer from 1995 to 2004. " For more information on this or any other computing topic, please visit our Digital Library at www.computer.org/publications/dlib. 536 IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 5, NO. 3, JULY-SEPTEMBER 2017 << /ASCII85EncodePages false /AllowTransparency false /AutoPositionEPSFiles true /AutoRotatePages /None /Binding /Left /CalGrayProfile (Gray Gamma 2.2) /CalRGBProfile (sRGB IEC61966-2.1) /CalCMYKProfile (U.S. Web Coated 050SWOP051 v2) /sRGBProfile (sRGB IEC61966-2.1) /CannotEmbedFontPolicy /Warning /CompatibilityLevel 1.4 /CompressObjects /Off /CompressPages true /ConvertImagesToIndexed true /PassThroughJPEGImages true /CreateJobTicket false /DefaultRenderingIntent /Default
  • 60. /DetectBlends true /DetectCurves 0.0000 /ColorConversionStrategy /sRGB /DoThumbnails true /EmbedAllFonts true /EmbedOpenType false /ParseICCProfilesInComments true /EmbedJobOptions true /DSCReportingLevel 0 /EmitDSCWarnings false /EndPage -1 /ImageMemory 1048576 /LockDistillerParams true /MaxSubsetPct 100 /Optimize true /OPM 0 /ParseDSCComments false /ParseDSCCommentsForDocInfo true /PreserveCopyPage true /PreserveDICMYKValues true /PreserveEPSInfo false /PreserveFlatness true /PreserveHalftoneInfo true /PreserveOPIComments false /PreserveOverprintSettings true /StartPage 1 /SubsetFonts false /TransferFunctionInfo /Remove /UCRandBGInfo /Preserve /UsePrologue false /ColorSettingsFile () /AlwaysEmbed [ true /Algerian /Arial-Black /Arial-BlackItalic /Arial-BoldItalicMT
  • 65. /Verdana-Bold /Verdana-BoldItalic /Verdana-Italic /VinerHandITC /Vivaldii /VladimirScript /Webdings /Wingdings2 /Wingdings3 /Wingdings-Regular /ZapfChanceryStd-Demi /ZWAdobeF ] /NeverEmbed [ true ] /AntiAliasColorImages false /CropColorImages true /ColorImageMinResolution 150 /ColorImageMinResolutionPolicy /OK /DownsampleColorImages true /ColorImageDownsampleType /Bicubic /ColorImageResolution 150 /ColorImageDepth -1 /ColorImageMinDownsampleDepth 1 /ColorImageDownsampleThreshold 1.50000 /EncodeColorImages true /ColorImageFilter /DCTEncode /AutoFilterColorImages false /ColorImageAutoFilterStrategy /JPEG /ColorACSImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /ColorImageDict << /QFactor 0.40 /HSamples [1 1 1 1] /VSamples [1 1 1 1]
  • 66. >> /JPEG2000ColorACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /JPEG2000ColorImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /AntiAliasGrayImages false /CropGrayImages true /GrayImageMinResolution 150 /GrayImageMinResolutionPolicy /OK /DownsampleGrayImages true /GrayImageDownsampleType /Bicubic /GrayImageResolution 300 /GrayImageDepth -1 /GrayImageMinDownsampleDepth 2 /GrayImageDownsampleThreshold 1.50000 /EncodeGrayImages true /GrayImageFilter /DCTEncode /AutoFilterGrayImages false /GrayImageAutoFilterStrategy /JPEG /GrayACSImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /GrayImageDict << /QFactor 0.40 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /JPEG2000GrayACSImageDict << /TileWidth 256 /TileHeight 256
  • 67. /Quality 15 >> /JPEG2000GrayImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /AntiAliasMonoImages false /CropMonoImages true /MonoImageMinResolution 1200 /MonoImageMinResolutionPolicy /OK /DownsampleMonoImages true /MonoImageDownsampleType /Bicubic /MonoImageResolution 600 /MonoImageDepth -1 /MonoImageDownsampleThreshold 1.50000 /EncodeMonoImages true /MonoImageFilter /CCITTFaxEncode /MonoImageDict << /K -1 >> /AllowPSXObjects false /CheckCompliance [ /None ] /PDFX1aCheck false /PDFX3Check false /PDFXCompliantPDFOnly false /PDFXNoTrimBoxError true /PDFXTrimBoxToMediaBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXSetBleedBoxToMediaBox true
  • 68. /PDFXBleedBoxToTrimBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXOutputIntentProfile (None) /PDFXOutputConditionIdentifier () /PDFXOutputCondition () /PDFXRegistryName () /PDFXTrapped /False /CreateJDFFile false /Description << /CHS <FEFF4f7f75288fd94e9b8bbe5b9a521b5efa76840020004100640 06f006200650020005000440046002065876863900275284e8e55 464e1a65876863768467e5770b548c62535370300260a853ef4ee5 4f7f75280020004100630072006f0062006100740020548c002000 410064006f0062006500200052006500610064006500720020003 5002e003000204ee553ca66f49ad87248672c676562535f00521b5 efa768400200050004400460020658768633002> /CHT <FEFF4f7f752890194e9b8a2d7f6e5efa7acb76840020004100640 06f006200650020005000440046002065874ef69069752865bc66 6e901a554652d965874ef6768467e5770b548c52175370300260a 853ef4ee54f7f75280020004100630072006f00620061007400205 48c002000410064006f0062006500200052006500610064006500 7200200035002e003000204ee553ca66f49ad87248672c4f86958b 555f5df25efa7acb76840020005000440046002065874ef63002> /DAN <FEFF004200720075006700200069006e0064007300740069006 c006c0069006e006700650072006e0065002000740069006c0020 006100740020006f0070007200650074007400650020004100640 06f006200650020005000440046002d0064006f006b0075006d00 65006e007400650072002c0020006400650072002000650067006
  • 69. e006500720020007300690067002000740069006c002000640065 00740061006c006a006500720065007400200073006b00e600720 06d007600690073006e0069006e00670020006f00670020007500 640073006b007200690076006e0069006e0067002000610066002 00066006f0072007200650074006e0069006e006700730064006f 006b0075006d0065006e007400650072002e00200044006500200 06f00700072006500740074006500640065002000500044004600 2d0064006f006b0075006d0065006e0074006500720020006b006 1006e002000e50062006e00650073002000690020004100630072 006f00620061007400200065006c006c006500720020004100630 072006f0062006100740020005200650061006400650072002000 35002e00300020006f00670020006e0079006500720065002e> /DEU <FEFF00560065007200770065006e00640065006e00200053006 90065002000640069006500730065002000450069006e00730074 0065006c006c0075006e00670065006e0020007a0075006d00200 0450072007300740065006c006c0065006e00200076006f006e00 2000410064006f006200650020005000440046002d0044006f006 b0075006d0065006e00740065006e002c00200075006d00200065 0069006e00650020007a0075007600650072006c00e4007300730 0690067006500200041006e007a00650069006700650020007500 6e00640020004100750073006700610062006500200076006f006 e00200047006500730063006800e40066007400730064006f006b 0075006d0065006e00740065006e0020007a00750020006500720 07a00690065006c0065006e002e00200044006900650020005000 440046002d0044006f006b0075006d0065006e007400650020006 b00f6006e006e0065006e0020006d006900740020004100630072 006f00620061007400200075006e0064002000520065006100640 065007200200035002e003000200075006e00640020006800f600 680065007200200067006500f600660066006e006500740020007 70065007200640065006e002e> /ESP <FEFF005500740069006c0069006300650020006500 730074006 100200063006f006e0066006900670075007200610063006900f3 006e0020007000610072006100200063007200650061007200200 064006f00630075006d0065006e0074006f007300200064006500
  • 70. 2000410064006f006200650020005000440046002000610064006 50063007500610064006f00730020007000610072006100200076 0069007300750061006c0069007a00610063006900f3006e00200 06500200069006d0070007200650073006900f3006e0020006400 6500200063006f006e006600690061006e007a006100200064006 500200064006f00630075006d0065006e0074006f007300200063 006f006d00650072006300690061006c00650073002e002000530 065002000700075006500640065006e0020006100620072006900 7200200064006f00630075006d0065006e0074006f00730020005 000440046002000630072006500610064006f007300200063006f 006e0020004100630072006f006200610074002c0020004100640 06f00620065002000520065006100640065007200200035002e00 3000200079002000760065007200730069006f006e00650073002 00070006f00730074006500720069006f007200650073002e> /FRA <FEFF005500740069006c006900730065007a002000630065007 30020006f007000740069006f006e00730020006100660069006e 00200064006500200063007200e90065007200200064006500730 0200064006f00630075006d0065006e0074007300200041006400 6f006200650020005000440046002000700072006f00660065007 300730069006f006e006e0065006c007300200066006900610062 006c0065007300200070006f007500720020006c0061002000760 069007300750061006c00690073006100740069006f006e002000 6500740020006c00270069006d007000720065007300730069006 f006e002e0020004c0065007300200064006f00630075006d0065 006e00740073002000500044004600200063007200e900e900730 02000700065007500760065006e0074002000ea00740072006500 20006f007500760065007200740073002000640061006e0073002 0004100630072006f006200610074002c002000610069006e0073 0069002000710075002700410064006f006200650020005200650 06100640065007200200035002e00300020006500740020007600 65007200730069006f006e007300200075006c007400e90072006 900650075007200650073002e> /ITA (Utilizzare queste impostazioni per creare documenti Adobe PDF adatti per visualizzare e stampare documenti aziendali in modo affidabile. I documenti PDF creati possono
  • 71. essere aperti con Acrobat e Adobe Reader 5.0 e versioni successive.) /JPN <FEFF30d330b830cd30b9658766f8306e8868793a304a30883073 53705237306b90693057305f002000410064006f0062006500200 050004400460020658766f8306e4f5c6210306b4f7f75283057307 e305930023053306e8a2d5b9a30674f5c62103055308c305f00200 05000440046002030d530a130a430eb306f300100410063007200 6f0062006100740020304a30883073002000410064006f0062006 5002000520065006100640065007200200035002e003000204ee5 964d3067958b304f30533068304c3067304d307e3059300230533 06e8a2d5b9a3067306f30d530a930f330c 8306e57cb30818fbc307f 3092884c3044307e30593002> /KOR <FEFFc7740020c124c815c7440020c0acc6a9d558c5ec0020be44 c988b2c8c2a40020bb38c11cb97c0020c548c815c801c73cb85c00 20bcf4ace00020c778c1c4d558b2940020b3700020ac00c7a50020 c801d569d55c002000410064006f0062006500200050004400460 020bb38c11cb97c0020c791c131d569b2c8b2e4002e0020c774b8 07ac8c0020c791c131b41c00200050004400460020bb38c11cb29 40020004100630072006f0062006100740020bc0f002000410064 006f00620065002000520065006100640065007200200035002e0 0300020c774c0c1c5d0c11c0020c5f40020c2180020c788c2b5b2c 8b2e4002e> /NLD (Gebruik deze instellingen om Adobe PDF-documenten te maken waarmee zakelijke documenten betrouwbaar kunnen worden weergegeven en afgedrukt. De gemaakte PDF- documenten kunnen worden geopend met Acrobat en Adobe Reader 5.0 en hoger.) /NOR <FEFF004200720075006b0020006400690073007300650020006 9006e006e007300740069006c006c0069006e00670065006e0065 002000740069006c002000e50020006f007000700072006500740 0740065002000410064006f006200650020005000440046002d00 64006f006b0075006d0065006e00740065007200200073006f006 d002000650072002000650067006e0065007400200066006f0072
  • 72. 0020007000e5006c006900740065006c006900670020007600690 073006e0069006e00670020006f00670020007500740073006b00 7200690066007400200061007600200066006f007200720065007 4006e0069006e006700730064006f006b0075006d0065006e0074 00650072002e0020005000440046002d0064006f006b0075006d0 065006e00740065006e00650020006b0061006e002000e5007000 6e00650073002000690020004100630072006f006200610074002 00065006c006c00650072002000410064006f0062006500200052 0065006100640065007200200035002e003000200065006c006c0 0650072002e> /PTB <FEFF005500740069006c0069007a00650020006500730073006 1007300200063006f006e00660069006700750072006100e700f5 0065007300200064006500200066006f0072006d0061002000610 0200063007200690061007200200064006f00630075006d006500 6e0074006f0073002000410064006f00620065002000500044004 600200061006400650071007500610064006f0073002000700061 0072006100200061002000760069007300750061006c0069007a0 06100e700e3006f002000650020006100200069006d0070007200 650073007300e3006f00200063006f006e0066006900e10076006 50069007300200064006500200064006f00630075006d0065006e 0074006f007300200063006f006d0065007200630069006100690 073002e0020004f007300200064006f00630075006d0065006e00 74006f00730020005000440046002000630072006900610064006 f007300200070006f00640065006d002000730065007200200061 0062006500720074006f007300200063006f006d0020006f00200 04100630072006f006200610074002000650020006f0020004100 64006f00620065002000520065006100640065007200200035002 e0030002000650020007600650072007300f50065007300200070 006f00730074006500720069006f007200650073002e> /SUO <FEFF004b00e40079007400e40020006e00e40069007400e4002 000610073006500740075006b007300690061002c0020006b0075 006e0020006c0075006f0074002000410064006f0062006500200 050004400460020002d0064006f006b0075006d0065006e007400 740065006a0061002c0020006a006f0074006b006100200073006
  • 73. f0070006900760061007400200079007200690074007900730061 007300690061006b00690072006a006f006a0065006e0020006c0 075006f00740065007400740061007600610061006e0020006e00 e400790074007400e4006d0069007300650065006e0020006a006 1002000740075006c006f007300740061006d0069007300650065 006e002e0020004c0075006f00640075007400200050004400460 02d0064006f006b0075006d0065006e0074006900740020007600 6f0069006400610061006e0020006100760061007400610020004 100630072006f0062006100740069006c006c00610020006a0061 002000410064006f0062006500200052006500610064006500720 0200035002e0030003a006c006c00610020006a00610020007500 7500640065006d006d0069006c006c0061002e> /SVE <FEFF0041006e007600e4006e00640020006400650020006800e 4007200200069006e0073007400e4006c006c006e0069006e0067 00610072006e00610020006f006d0020006400750020007600690 06c006c00200073006b006100700061002000410064006f006200 650020005000440046002d0064006f006b0075006d0065006e007 400200073006f006d002000700061007300730061007200200066 00f60072002000740069006c006c006600f60072006c006900740 06c006900670020007600690073006e0069006e00670020006f00 6300680020007500740073006b007200690066007400650072002 000610076002000610066006600e4007200730064006f006b0075 006d0065006e0074002e002000200053006b00610070006100640 0650020005000440046002d0064006f006b0075006d0065006e00 740020006b0061006e002000f600700070006e006100730020006 90020004100630072006f0062006100740020006f006300680020 00410064006f00620065002000520065006100640065007200200 035002e00300020006f00630068002000730065006e0061007200 65002e> /ENU (Use these settings to create PDFs that match the "Suggested" settings for PDF Specification 4.0) >> >> setdistillerparams << /HWResolution [600 600]