Advertisement

Cloud Security Auditing

  • Suryadipta Majumdar
  • Taous Madi
  • Yushun Wang
  • Azadeh Tabiban
  • Momen Oqaily
  • Amir Alimohammadifar
  • Yosr Jarraya
  • Makan Pourzandi
  • Lingyu Wang
  • Mourad Debbabi
Book

Part of the Advances in Information Security book series (ADIS, volume 76)

Table of contents

  1. Front Matter
    Pages i-xi
  2. Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar et al.
    Pages 1-7
  3. Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar et al.
    Pages 9-16
  4. Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar et al.
    Pages 17-38
  5. Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar et al.
    Pages 39-70
  6. Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar et al.
    Pages 71-102
  7. Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar et al.
    Pages 103-143
  8. Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar et al.
    Pages 145-156
  9. Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar et al.
    Pages 157-159
  10. Back Matter
    Pages 161-166

About this book

Introduction

This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers. It presents an off-line automated framework for auditing consistent isolation between virtual networks in OpenStack-managed cloud spanning over overlay and layer 2 by considering both cloud layers’ views. A runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC and SSO is covered as well. 

This book also discusses a learning-based proactive security auditing system, which extracts probabilistic dependencies between runtime events and applies such dependencies to proactively audit and prevent security violations resulting from critical events. Finally, this book elaborates the design and implementation of a middleware as a pluggable interface to OpenStack for intercepting and verifying the legitimacy of user requests at runtime.

The authors discuss how state-of-the-art security auditing solutions may help increase cloud tenants’ trust in the service providers by providing assurance on the compliance with the applicable laws, regulations, policies, and standards. This book introduces the latest research results on both traditional retroactive auditing and novel (runtime and proactive) auditing techniques to serve different stakeholders in the cloud. This book covers security threats from different cloud abstraction levels and discusses a wide-range of security properties related to cloud-specific standards (e.g., Cloud Control Matrix (CCM) and ISO 27017). It also elaborates on the integration of security auditing solutions into real world cloud management platforms (e.g., OpenStack, Amazon AWS and Google GCP).

This book targets industrial scientists, who are working on cloud or security-related topics, as well as security practitioners, administrators, cloud providers and operators. Researchers and advanced-level students studying and working in computer science, practically in cloud security will also be interested in this book.

Keywords

Cloud Computing Cloud Security Security Auditing Security Compliance Compliance Verification Network Isolation Cloud Infrastructure Security Virtual Network Security Layer 2 Security Layer 3 Security Access Control OpenStack Cloud Control Matrix (CCM) ISO 27017

Authors and affiliations

  • Suryadipta Majumdar
    • 1
  • Taous Madi
    • 2
  • Yushun Wang
    • 3
  • Azadeh Tabiban
    • 4
  • Momen Oqaily
    • 5
  • Amir Alimohammadifar
    • 6
  • Yosr Jarraya
    • 7
  • Makan Pourzandi
    • 8
  • Lingyu Wang
    • 9
  • Mourad Debbabi
    • 10
  1. 1.Information Security and Digital ForensiUniversity at Albany - SUNYAlbanyUSA
  2. 2.CIISEConcordia UniversityMontréalCanada
  3. 3.CIISEConcordia UniversityMontrealCanada
  4. 4.CIISEConcordia UniversityMontrealCanada
  5. 5.CIISEConcordia UniversityMontrealCanada
  6. 6.Concordia UniversityMontrealCanada
  7. 7.Ericsson Security ResearchSaint-LaurentCanada
  8. 8.Ericsson Security ResearchMontrealCanada
  9. 9.CIISEConcordia UniversityMontrealCanada
  10. 10.Concordia UniversityMontrealCanada

Bibliographic information