loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Gautam Kumar and Brent Lagesse

Affiliation: University of Washington Bothell, United States

Keyword(s): Security, Moving Target Defence, Cryptography, Cloud Architecture.

Abstract: Many enterprises and consumers today are dependent on services deployed on Infrastructure as a Service (IaaS) cloud providers. Such cloud deployments can have hundreds of virtual servers running. Each virtual server needs to have access to sensitive information such as database passwords and API keys. In such as scenario, verifying that a large number of servers have not been compromised is an arduous task. In this paper we propose an architecture which limits the extent to which an attacker can exploit a compromised server in a large scale cloud deployment. To achieve such a limitation we propose the use of hash chains as an authentication mechanism for virtual server with a Central Trusted Authority (CTA) acting as a proxy to sensitive resources. This architecture shifts the requirement of security validation from hundreds of public facing servers to a few servers without public interfaces which comprise the CTA. Since hash chains offer an inherent limitation in their use, our architecture leans towards using ephemeral virtual servers, thus also providing a moving target defence. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.224.0.25

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Kumar, G. and Lagesse, B. (2017). Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers. In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-209-7; ISSN 2184-4356, SciTePress, pages 447-454. DOI: 10.5220/0006208704470454

@conference{icissp17,
author={Gautam Kumar. and Brent Lagesse.},
title={Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers},
booktitle={Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP},
year={2017},
pages={447-454},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006208704470454},
isbn={978-989-758-209-7},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP
TI - Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers
SN - 978-989-758-209-7
IS - 2184-4356
AU - Kumar, G.
AU - Lagesse, B.
PY - 2017
SP - 447
EP - 454
DO - 10.5220/0006208704470454
PB - SciTePress