Publication List of the PaaSword Consortium

2016

  • S. Schork, “Kontext-sensitive Berechtigungen für Cloud-Plattformen zur Erhöhung der Datensicherheit,” Master Thesis, Hochschule Karlsruhe – University of Applied Sciences, 2016.
    [BibTeX] [Abstract]

    Die vorliegende Arbeit untersucht den Einsatz von kontextsensitiven Berechtigungen in Cloudanwendungen. Sie betrachtet Kontext dabei als Sammlung von Sensorwerten, die sich über das mobile Endgerät eines Anwenders ermitteln lassen. Im Vordergrund steht die Erweiterung bestehender Berechtigungssysteme, wobei sich die Arbeit am aktuellen Stand der Technik orientiert und industrielle Bedürfnisse berücksichtigt. Die Arbeit verbindet Erkenntnisse grundlegender sowie jüngster Forschung aus dem Gebiet der Computersicherheit und nutzt diese im Rahmen der Entwicklung eines Prototyps, der die bestehende Cloudanwendung um eine Infrastruktur zur Erfassung und Verarbeitung von Kontextinformationen erweitert. Anhand der prototypischen Umsetzung wird gezeigt, dass eine ressourcen- und anwenderfreundliche Umsetzung eines kontextsensitiven Berechtigungssystems basierend auf XACML in einer bestehenden Cloudlösung minimalinvasiv möglich ist, was mit einer praxisnahen Validierung belegt wird. Die Arbeit diskutiert außerdem Schwierigkeiten, die sich in diesem Zusammenhang ergeben und zeigt mögliche Optimierungspotenziale der vorgestellten Ergebnisse auf.

    @mastersthesis{schork2016kontextsensitiv,
    abstract = {Die vorliegende Arbeit untersucht den Einsatz von kontextsensitiven Berechtigungen in Cloudanwendungen. Sie betrachtet Kontext dabei als Sammlung von Sensorwerten, die sich über das mobile Endgerät eines Anwenders ermitteln lassen. Im Vordergrund steht die Erweiterung bestehender Berechtigungssysteme, wobei sich die Arbeit am aktuellen Stand der Technik orientiert und industrielle Bedürfnisse berücksichtigt. Die Arbeit verbindet Erkenntnisse grundlegender sowie jüngster Forschung aus dem Gebiet der Computersicherheit und nutzt diese im Rahmen der Entwicklung eines Prototyps, der die bestehende Cloudanwendung um eine Infrastruktur zur Erfassung und Verarbeitung von Kontextinformationen erweitert. Anhand der prototypischen Umsetzung wird gezeigt, dass eine ressourcen- und anwenderfreundliche Umsetzung eines kontextsensitiven Berechtigungssystems basierend auf XACML in einer bestehenden Cloudlösung minimalinvasiv möglich ist, was mit einer praxisnahen Validierung belegt wird. Die Arbeit diskutiert außerdem Schwierigkeiten, die sich in diesem Zusammenhang ergeben und zeigt mögliche Optimierungspotenziale der vorgestellten Ergebnisse auf.},
    author = {Schork, Sebastian},
    day = 14,
    institution = {Hochschule Karlsruhe - University of Applied Sciences},
    interhash = {275010cc84c96e8a03caca7410fe9af0},
    intrahash = {e6a0a74e2f7ad9dba7e07bf303de5fbb},
    month = {09},
    organization = {CAS Software AG},
    title = {Kontext-sensitive Berechtigungen für Cloud-Plattformen zur Erhöhung der Datensicherheit
    },
    year = 2016
    }

  • S. Veloudis, I. Paraskakis, and C. Petsos, “Validating Policies for Dynamic and Heterogeneous Cloud Environments,” in Collaboration in a Hyperconnected World: 17th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2016, Porto, Portugal, October 3-5, 2016, Proceedings, Cham, 2016, pp. 506-517. doi:10.1007/978-3-319-45390-3_43
    [BibTeX] [Abstract] [Download PDF]

    With the pervasion of cloud computing, virtual enterprises (VEs) are anticipated to increasingly rely on ecosystems of highly distributed, task-oriented, and collaborative cloud services for their operations. In order to manage the complexity inherent in such ecosystems, VEs are expected to increasingly depend upon policies that regulate the deployment and delivery of these services. Nevertheless, the heterogeneity inherent in cloud services hinders the formulation of effective and interoperable such policies. This calls for a policy validation mechanism that is able to automatically evaluate the correctness of these policies. This paper proposes such a validation mechanism, one which is underpinned by a generic representation of the knowledge that lurks behind policies and thus is orthogonal to any particular cloud service delivery platform.

    @inproceedings{Veloudis2016,
    abstract = {With the pervasion of cloud computing, virtual enterprises (VEs) are anticipated to increasingly rely on ecosystems of highly distributed, task-oriented, and collaborative cloud services for their operations. In order to manage the complexity inherent in such ecosystems, VEs are expected to increasingly depend upon policies that regulate the deployment and delivery of these services. Nevertheless, the heterogeneity inherent in cloud services hinders the formulation of effective and interoperable such policies. This calls for a policy validation mechanism that is able to automatically evaluate the correctness of these policies. This paper proposes such a validation mechanism, one which is underpinned by a generic representation of the knowledge that lurks behind policies and thus is orthogonal to any particular cloud service delivery platform.},
    address = {Cham},
    author = {Veloudis, Simeon and Paraskakis, Iraklis and Petsos, Christos},
    booktitle = {Collaboration in a Hyperconnected World: 17th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2016, Porto, Portugal, October 3-5, 2016, Proceedings},
    doi = {10.1007/978-3-319-45390-3_43},
    editor = {Afsarmanesh, Hamideh and Camarinha-Matos, M. Luis and Lucas Soares, Ant{\'o}nio},
    interhash = {7b6a41f685e360eff1283fa7060cf151},
    intrahash = {8b405ba47e85c8b03ec93aeda68712ca},
    isbn = {978-3-319-45390-3},
    pages = {506--517},
    publisher = {Springer International Publishing},
    series = {IFIP Advances in Information and Communication Technology},
    title = {Validating Policies for Dynamic and Heterogeneous Cloud Environments},
    url = {http://dx.doi.org/10.1007/978-3-319-45390-3_43},
    volume = 480,
    year = 2016
    }

  • S. Veloudis and I. Paraskakis, “Ontological Templates for Modelling Security Policies in Cloud Environments,” in 20th Pan-Hellenic Conference on Informatics (PCI’16), 2016.
    [BibTeX]
    @inproceedings{veloudis2016ontological,
    author = {Veloudis, Simeon and Paraskakis, Iraklis},
    booktitle = {20th Pan-Hellenic Conference on Informatics (PCI'16)},
    interhash = {c61777e5a4753a6936ce16b23d4af647},
    intrahash = {6e05dfe7bdfda4ca921bb220f24a7fad},
    title = {Ontological Templates for Modelling Security Policies in Cloud Environments},
    year = 2016
    }

  • S. Veloudis and I. Paraskakis, “Defining an Ontological Framework for Modelling Policies in Cloud Environments.,” in 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom’16), 2016.
    [BibTeX]
    @inproceedings{veloudis2016defining,
    author = {Veloudis, Simeon and Paraskakis, Iraklis},
    booktitle = {8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom'16)},
    interhash = {1a3cbfed846b26813a55370d71822991},
    intrahash = {ae24022995b9775373f1ffcaed192ba7},
    title = {Defining an Ontological Framework for Modelling Policies in Cloud Environments.},
    year = 2016
    }

  • R. Dowsley, M. Gabel, G. Hübsch, S. Schiefer, and A. Schwichtenberg, “A Distributed Key Management Approach,” in Proceedings of the 2nd International Workshop on Cloud Security and Data Privacy by Design (CloudSPD’16), 2016.
    [BibTeX] [Abstract]

    Cloud computing provides reliable and highly-scalable access to resources over the internet. But outsourcing sensitive data to an untrusted third party requires cryptographic methods like encryption. This paper presents a novel approach to a distributed cloud key management scheme. In a setting with a public cloud, data is encrypted by a trusted adapter before upload. The encryption key is not persistently stored at the adapter. Several entities share parts of the key that is computed and temporarily stored at the adapter if needed. This work describes how the key management is working during bootstrapping and runtime as well as how recovery is performed.

    @inproceedings{dowsley2016distributed,
    abstract = {Cloud computing provides reliable and highly-scalable access to resources over the internet.
    But outsourcing sensitive data to an untrusted third party requires cryptographic methods like encryption.
    This paper presents a novel approach to a distributed cloud key management scheme.
    In a setting with a public cloud, data is encrypted by a trusted adapter before upload.
    The encryption key is not persistently stored at the adapter.
    Several entities share parts of the key that is computed and temporarily stored at the adapter if needed.
    This work describes how the key management is working during bootstrapping and runtime as well as how recovery is performed.},
    author = {Dowsley, Rafael and Gabel, Matthias and Hübsch, Gerald and Schiefer, Schiefer and Schwichtenberg, Antonia},
    booktitle = {Proceedings of the 2nd International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'16)},
    editor = {Gehrmann, Christian and Mentzas, Gregoris and Michalas, Antonis and Müller-Quade, Jörn and Verginadis, Yiannis},
    interhash = {1730e642ea457952e054d2c3af6b463d},
    intrahash = {9110c92fbc928aea64eeca58a449763d},
    month = dec,
    title = {A Distributed Key Management Approach},
    year = 2016
    }

  • R. Dowsley, M. Gabel, K. Yurchenko, and V. Zipf, “A Database Adapter for Secure Outsourcing,” in Proceedings of the 2nd International Workshop on Cloud Security and Data Privacy by Design (CloudSPD’16), 2016.
    [BibTeX] [Abstract]

    The advent of cloud computing and storage provides numerous opportunities for better management of resources, with the potential of drastically reducing costs. However, when data is outsourced to the cloud, new security vulnerabilities emerge, as the cloud provider (and its employees) are normally not completely trusted by the party that is outsourcing the data. Therefore additional security mechanisms are needed in order to prevent against internal attacks in the cloud provider. Nonetheless, the performance and functionality should be impacted as less as possible. This work presents a database adapter for the secure outsourcing of data that aims at achieving a good performance-security trade-off.

    @inproceedings{dowsley2016database,
    abstract = {The advent of cloud computing and storage provides numerous opportunities for better management of resources, with the potential of drastically reducing costs. However, when data is outsourced to the cloud, new security vulnerabilities emerge, as the cloud provider (and its employees) are normally not completely trusted by the party that is outsourcing the data. Therefore additional security mechanisms are needed in order to prevent against internal attacks in the cloud provider. Nonetheless, the performance and functionality should be impacted as less as possible. This work presents a database adapter for the secure outsourcing of data that aims at achieving a good performance-security trade-off.},
    author = {Dowsley, Rafael and Gabel, Matthias and Yurchenko, Kateryna and Zipf, Valentin},
    booktitle = {Proceedings of the 2nd International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'16)},
    editor = {Gehrmann, Christian and Mentzas, Gregoris and Michalas, Antonis and Müller-Quade, Jörn and Verginadis, Yiannis},
    interhash = {b03bab5d12818bfe11c28ab5f05dd495},
    intrahash = {93058a92a3a5242f35ff82ff47ac8b62},
    month = dec,
    title = {A Database Adapter for Secure Outsourcing},
    year = 2016
    }

  • Y. Verginadis, I. Patiniotakis, G. Mentzas, S. Veloudis, and I. Paraskakis, “Data Distribution and Encryption Modelling for PaaS-enabled Cloud Security,” in Proceedings of the 2nd International Workshop on Cloud Security and Data Privacy by Design (CloudSPD’16), 2016.
    [BibTeX] [Abstract]

    Some of the most valuable business benefits that accompany the cloud adoption cannot be exploited without addressing, first, new data security challenges posed by cloud computing distributed nature. A promising approach for alleviating these risks is to provide a security-by-design framework that will assist cloud application developers in defining appropriate context-driven policies that enhance cloud security at design-time and enforce access control at run-time. This paper discusses a generic and extensible formalism, called Context-aware Security Policy Model that can be tailored to the particular needs of different cloud applications for enhancing the privacy and confidentiality of sensitive data.

    @inproceedings{verginadis2016distribution,
    abstract = {Some of the most valuable business benefits that accompany the cloud adoption cannot be exploited without addressing, first, new data security challenges posed by cloud computing distributed nature. A promising approach for alleviating these risks is to provide a security-by-design framework that will assist cloud application developers in defining appropriate context-driven policies that enhance cloud security at design-time and enforce access control at run-time. This paper discusses a generic and extensible formalism, called Context-aware Security Policy Model that can be tailored to the particular needs of different cloud applications for enhancing the privacy and confidentiality of sensitive data.},
    author = {Verginadis, Yiannis and Patiniotakis, Ioannis and Mentzas, Gregoris and Veloudis, Simeon and Paraskakis, Iraklis},
    booktitle = {Proceedings of the 2nd International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'16)},
    editor = {Gehrmann, Christian and Mentzas, Gregoris and Michalas, Antonis and Müller-Quade, Jörn and Verginadis, Yiannis},
    interhash = {98b319a8aa01bed96dab240cc051558d},
    intrahash = {07b4c3560d97da95ccbe25e6a9767fde},
    month = dec,
    title = {Data Distribution and Encryption Modelling for PaaS-enabled Cloud Security},
    year = 2016
    }

  • A. Schoknecht, G. Schiefer, M. Citak, and A. Oberweis, “Security-by-Design in Cloud Application Development,” HMD Praxis der Wirtschaftsinformatik, vol. 53, iss. 5, pp. 688-697, 2016. doi:10.1365/s40702-016-0258-1
    [BibTeX] [Abstract] [Download PDF]

    Companies increasingly recognize the economical and operational advantages of Cloud Computing, which enables them to realize significant cost savings and to speed up the setup of software applications. Yet, the usage of Cloud Computing requires the consideration of new challenges regarding data security, which pose a serious threat to the adoption of Cloud Computing. This article presents results from the EU-funded PaaSword project, which aims at increasing the trust in Cloud Computing. A holistic data security framework will be developed during the project, whereby the focus is on software developers, who shall be supported during the development of secure cloud applications and services. Therefore, firstly, the underlying architecture concept for secure storage of data is introduced. The context-based access control component is described in further details afterwards. The central aspect of this access control component is a context-based access control model, which can be used by developers to annotate data access objects. The access control model itself builds upon an attribute-based access control model. Thereby, access rights are granted through the evaluation of access rules, which take context attributes into account. Such attributes might, e.{\thinspace}g., be the role of a user within an organization, the IP address or type of the requesting device. The PaaSword access control model conceptualizes aspects which shall be considered during the selection of data access rules and with which the context-based access control model determines under which circumstances an access request on which data is allowed. The formulation of such rules is based on the XACML standard, which allows combining single rules with context conditions to more complex policies.

    @article{Schoknecht2016,
    abstract = {Companies increasingly recognize the economical and operational advantages of Cloud Computing, which enables them to realize significant cost savings and to speed up the setup of software applications. Yet, the usage of Cloud Computing requires the consideration of new challenges regarding data security, which pose a serious threat to the adoption of Cloud Computing. This article presents results from the EU-funded PaaSword project, which aims at increasing the trust in Cloud Computing. A holistic data security framework will be developed during the project, whereby the focus is on software developers, who shall be supported during the development of secure cloud applications and services. Therefore, firstly, the underlying architecture concept for secure storage of data is introduced. The context-based access control component is described in further details afterwards. The central aspect of this access control component is a context-based access control model, which can be used by developers to annotate data access objects. The access control model itself builds upon an attribute-based access control model. Thereby, access rights are granted through the evaluation of access rules, which take context attributes into account. Such attributes might, e.{\thinspace}g., be the role of a user within an organization, the IP address or type of the requesting device. The PaaSword access control model conceptualizes aspects which shall be considered during the selection of data access rules and with which the context-based access control model determines under which circumstances an access request on which data is allowed. The formulation of such rules is based on the XACML standard, which allows combining single rules with context conditions to more complex policies.},
    author = {Schoknecht, Andreas and Schiefer, Gunther and Citak, Murat and Oberweis, Andreas},
    doi = {10.1365/s40702-016-0258-1},
    interhash = {fa403efb7b136d40f4495db7dc05bb7b},
    intrahash = {27305dc3152b811a6924ebfbc75f74a8},
    issn = {2198-2775},
    journal = {HMD Praxis der Wirtschaftsinformatik},
    number = 5,
    pages = {688--697},
    title = {Security-by-Design in Cloud Application Development},
    url = {http://rdcu.be/jXBU},
    volume = 53,
    year = 2016
    }

  • K. Yurchenko, “Enhancing Privacy and Functionality in a Distributed Secure Database Outsourcing Scheme,” Master Thesis, Karlsruhe Institute of Technology (KIT), 2016.
    [BibTeX]
    @mastersthesis{yurchenko2016enhancing,
    author = {Yurchenko, Kateryna},
    institution = {Karlsruhe Institute of Technology (KIT)},
    interhash = {6119408f63e49af044da888d4c95f5fd},
    intrahash = {5ebda22138a9c3aef9eb5c15856cc2db},
    title = {Enhancing Privacy and Functionality in a Distributed Secure Database Outsourcing Scheme},
    year = 2016
    }

  • M. Lindström and C. Nordahl, “The BXT-Bitmap – An Efficient Searchable Symmetric Encryption Scheme,” Master Thesis, Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik, 2016.
    [BibTeX]
    @mastersthesis{lindstrom2016bxtbitmap,
    author = {Lindström, Malin and Nordahl, Christian},
    institution = {Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik},
    interhash = {b3fc72a3e9ba82d310a2ce81c632cc79},
    intrahash = {d448ab10327bac366a7febab82060fa4},
    title = {The BXT-Bitmap - An Efficient Searchable Symmetric Encryption Scheme},
    year = 2016
    }

  • S. Veloudis, Y. Verginadis, I. Patiniotakis, I. Paraskakis, and G. Mentzas, “Context-aware Security Models for PaaS-enabled Access Control,” in Proceedings of the 6th International Conference on Cloud Computing and Services Science, 2016, pp. 202-212. doi:10.5220/0005918602020212
    [BibTeX] [Abstract] [Download PDF]

    Enterprises are embracing cloud computing in order to reduce costs and increase agility in their everyday business operations. Nevertheless, due mainly to confidentiality, privacy and integrity concerns, many are still reluctant to migrate their sensitive data to the cloud. In this paper, firstly, we outline the construction of a suitable Context-aware Security Model, for enhancing security in cloud applications. Secondly, we outline the construction of an extensible and declarative formalism for representing policy-related knowledge, one which disentangles the definition of a policy from the code employed for enforcing it. Both of them will be employed for supporting innovative PaaS-enabled access control mechanisms.

    @inproceedings{veloudis2016contextaware,
    abstract = { Enterprises are embracing cloud computing in order to reduce costs and increase agility in their everyday business operations. Nevertheless, due mainly to confidentiality, privacy and integrity concerns, many are still reluctant to migrate their sensitive data to the cloud. In this paper, firstly, we outline the construction of a suitable Context-aware Security Model, for enhancing security in cloud applications. Secondly, we outline the construction of an extensible and declarative formalism for representing policy-related knowledge, one which disentangles the definition of a policy from the code employed for enforcing it. Both of them will be employed for supporting innovative PaaS-enabled access control mechanisms.},
    author = {Veloudis, Simeon and Verginadis, Yiannis and Patiniotakis, Ioannis and Paraskakis, Iraklis and Mentzas, Gregoris},
    booktitle = {Proceedings of the 6th International Conference on Cloud Computing and Services Science},
    doi = {10.5220/0005918602020212},
    editor = {Cardoso, Jorge and Ferguson, Donald and Mu{\~{n}}oz, V{\'{\i}}ctor M{\'{e}}ndez and Helfert, Markus},
    interhash = {9f599728c2d48bd698411c68f8a1478a},
    intrahash = {aa26f6e478c71a60577e5f98edf74063},
    isbn = {978-989-758-182-3},
    pages = {202-212},
    title = {Context-aware Security Models for PaaS-enabled Access Control},
    url = {http://dx.doi.org/10.5220/0005918602020212},
    year = 2016
    }

  • B. Gallego-Nicasio Crespo, E. Prieto, E. Rios, M. Rak, P. Deussen, P. Samarati, R. Cascella, S. Braun, S. Krenn, and T. Lörunser, “Research and Innovation Challenges in Data Protection, Security and Privacy in the Cloud: Map of synergies of the clustered projects – Version 2.0,” DPSP Cluster, Whitepaper , 2016.
    [BibTeX] [Abstract] [Download PDF]

    The present open access document aims to depict the map of research topics and innovations of the projects in the Data Protection Security and Privacy in the Cloud cluster (from now on DPSP cluster for short). The DPSP cluster includes projects and actions on Cloud partially funded by the European Commission through the H2020-LEIT-ICT, FP7-Collaboration-ICT, and CIP-ICT-PSP programmes. The document summarizes the objectives and research topics of the projects in the cluster and identifies the common topics of interest, the common used technologies and tools, the common development directions, and the commonly used standards. This information serves to identify the synergies between the projects in the form of key topics for collaborations and take-up’s between the projects and actions. Therefore, the document is called the Map of synergies of the clustered projects.

    @techreport{gallegonicasiocrespo2016research,
    abstract = {The present open access document aims to depict the map of research topics and innovations of the projects in the Data Protection Security and Privacy in the Cloud cluster (from now on DPSP cluster for short). The DPSP cluster includes projects and actions on Cloud partially funded by the European Commission through the H2020-LEIT-ICT, FP7-Collaboration-ICT, and CIP-ICT-PSP programmes. The document summarizes the objectives and research topics of the projects in the cluster and identifies the common topics of interest, the common used technologies and tools, the common development directions, and the commonly used standards. This information serves to identify the synergies between the projects in the form of key topics for collaborations and take-up’s between the projects and actions. Therefore, the document is called the Map of synergies of the clustered projects.},
    author = {Gallego-Nicasio Crespo, Beatriz and Prieto, Elsa and Rios, Erkuden and Rak, Massimiliano and Deussen, Peter and Samarati, Pierangela and Cascella, Roberto and Braun, Simone and Krenn, Stephan and Lörunser, Thomas},
    institution = {DPSP Cluster},
    interhash = {892d62bbe656da4033b41fe44ca6821e},
    intrahash = {a9903f357638225b4d66d9e0c54e0f84},
    month = jan,
    title = {Research and Innovation Challenges in Data Protection, Security and Privacy in the Cloud: Map of synergies of the clustered projects – Version 2.0},
    type = {Whitepaper},
    url = {https://eucloudclusters.files.wordpress.com/2015/05/dpsp_cluster_map-of-synergies_v2-0.pdf},
    year = 2016
    }

  • R. Dowsley, A. Michalas, and M. Nagel, “A Report on Design and Implementation of Protected Searchable Data in IaaS,” SICS 2016.
    [BibTeX] [Abstract] [Download PDF]

    In the first part of this report we present a survey of the state of the art in searchable encryption and its relevance for cloud computing. In particular we focus on the OpenStack open-source cloud platform and investigate which searchable encryption schemes are more amenable for adoption in conjunction with platforms based on OpenStack. Based on that survey we chose one of the schemes to implement and test if it is practical enough to deploy in real systems. On the second part of this report we discuss the results of the implementation.

    @techreport{dowsley2016report,
    abstract = {In the first part of this report we present a survey of the state of the art in searchable encryption and its relevance for cloud computing. In particular we focus on the OpenStack open-source cloud platform and investigate which searchable encryption schemes are more amenable for adoption in conjunction with platforms based on OpenStack. Based on that survey we chose one of the schemes to implement and test if it is practical enough to deploy in real systems. On the second part of this report we discuss the results of the implementation.},
    author = {Dowsley, Rafael and Michalas, Antonis and Nagel, Matthias},
    institution = {SICS},
    interhash = {4c0dd288ef1efdf2e9fa3ec2b2ed1c05},
    intrahash = {f1ad67ce5aea051188d03983f13dbec9},
    title = {A Report on Design and Implementation of Protected Searchable Data in IaaS},
    url = {http://soda.swedishict.se/5921/1/T2016_01.pdf},
    year = 2016
    }

2015

  • N. Paladi and C. Gehrmann, “Towards Secure Multi-tenant Virtualized Networks,” in Trustcom/BigDataSE/ISPA, 2015 IEEE, 2015, pp. 1180-1185. doi:10.1109/Trustcom.2015.502
    [BibTeX] [Abstract]

    Network virtualization enables multi-tenancy over physical network infrastructure, with a side-effect of increased network complexity. Software-defined networking (SDN) is a novel network architectural model — one where the control plane is separated from the data plane by a standardized API — which aims to reduce the network management overhead. However, as the SDN model itself is evolving, its application to multi-tenant virtualized networks raises multiple security challenges. In this paper, we present a security analysis of SDN-based multi-tenant virtualized networks: we outline the security assumptions applicable to such networks, define the relevant adversarial model, identify the main attack vectors for such network infrastructure deployments and finally synthesize a set of high-level security requirements for SDN-based multi-tenant virtualized networks. This paper sets the foundation for future design of secure SDN-based multi-tenant virtualized networks.

    @inproceedings{7345410,
    abstract = {Network virtualization enables multi-tenancy over physical network infrastructure, with a side-effect of increased network complexity. Software-defined networking (SDN) is a novel network architectural model -- one where the control plane is separated from the data plane by a standardized API -- which aims to reduce the network management overhead. However, as the SDN model itself is evolving, its application to multi-tenant virtualized networks raises multiple security challenges. In this paper, we present a security analysis of SDN-based multi-tenant virtualized networks: we outline the security assumptions applicable to such networks, define the relevant adversarial model, identify the main attack vectors for such network infrastructure deployments and finally synthesize a set of high-level security requirements for SDN-based multi-tenant virtualized networks. This paper sets the foundation for future design of secure SDN-based multi-tenant virtualized networks.},
    author = {Paladi, N. and Gehrmann, C.},
    booktitle = {Trustcom/BigDataSE/ISPA, 2015 IEEE},
    doi = {10.1109/Trustcom.2015.502},
    interhash = {bc1f3ea0ee90395921180ba2e127db3b},
    intrahash = {b029889a94bee39cf8d62b4b80c309de},
    month = aug,
    pages = {1180-1185},
    title = {Towards Secure Multi-tenant Virtualized Networks},
    volume = 1,
    year = 2015
    }

  • N. Paladi, “Towards Secure SDN Policy Management,” in 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), 2015, pp. 607-611. doi:10.1109/UCC.2015.106
    [BibTeX] [Abstract] [Download PDF]

    Software-Defined Networking (SDN) has emerged as a novel network architectural model that facilitates management of large-scale networks, enables efficient network virtualization and scalable network multi-tenancy. Centralized network controllers, an important component in the SDN paradigm, deploy on the data plane devices network policies from several independent sources, defined based on a global network view. While this approach allows to efficiently manage network connectivity and reduce the time and cost of deploying new configurations, it also increases the risk for errors — either introduced by accident, through a combination with previous policies, or by a motivated adversary. In this position paper we review the state of the art for network policy verification for SDN deployments, identify existing challenges and outline a secure framework for network policy management in SDN deployments. Combined with existing work on cloud platform and storage security, this will contribute towards creating secure and trusted cloud deployments.

    @inproceedings{7431482,
    abstract = {Software-Defined Networking (SDN) has emerged as a novel network architectural model that facilitates management of large-scale networks, enables efficient network virtualization and scalable network multi-tenancy. Centralized network controllers, an important component in the SDN paradigm, deploy on the data plane devices network policies from several independent sources, defined based on a global network view. While this approach allows to efficiently manage network connectivity and reduce the time and cost of deploying new configurations, it also increases the risk for errors -- either introduced by accident, through a combination with previous policies, or by a motivated adversary. In this position paper we review the state of the art for network policy verification for SDN deployments, identify existing challenges and outline a secure framework for network policy management in SDN deployments. Combined with existing work on cloud platform and storage security, this will contribute towards creating secure and trusted cloud deployments.},
    author = {Paladi, N.},
    booktitle = {2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)},
    doi = {10.1109/UCC.2015.106},
    interhash = {db8ca789cfc0613ba48fd16697b5fad1},
    intrahash = {45f22be7743b5cd16ca1f6467c55182e},
    month = dec,
    pages = {607-611},
    title = {Towards Secure SDN Policy Management},
    url = {http://doi.ieeecomputersociety.org/10.1109/UCC.2015.106},
    year = 2015
    }

  • J. Vuong and S. Braun, “Towards Efficient and Secure Data Storage in Multi-tenant Cloud-Based CRM Solutions,” in 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), 2015, pp. 612-617. doi:10.1109/UCC.2015.107
    [BibTeX] [Abstract] [Download PDF]

    Even though enterprises increasingly recognize the benefits of cloud computing, many are still reluctant using cloud-based applications or services like customer relationship management (CRM) solutions due to security and privacy concerns. This article aims at defining a roadmap to derive a holistic framework providing data privacy and security by design in the context of cloud-based multi-tenant CRM systems. As a CRM system developed for SMEs CAS PIA serves as an example for typically occurring data structures and use cases including the innovative concept of user-defined security levels for different data types. We present a scenario and requirements analysis for motivating the need for a suitable user-context-specific security concept and a data and privacy preserving framework.

    @inproceedings{7431483,
    abstract = {Even though enterprises increasingly recognize the benefits of cloud computing, many are still reluctant using cloud-based applications or services like customer relationship management (CRM) solutions due to security and privacy concerns. This article aims at defining a roadmap to derive a holistic framework providing data privacy and security by design in the context of cloud-based multi-tenant CRM systems. As a CRM system developed for SMEs CAS PIA serves as an example for typically occurring data structures and use cases including the innovative concept of user-defined security levels for different data types. We present a scenario and requirements analysis for motivating the need for a suitable user-context-specific security concept and a data and privacy preserving framework.},
    author = {Vuong, J. and Braun, S.},
    booktitle = {2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)},
    doi = {10.1109/UCC.2015.107},
    interhash = {4d023e9738b7892bbcdb3f240a503976},
    intrahash = {a2668155e228f129e93fd4c77a7b6a37},
    month = dec,
    pages = {612-617},
    title = {Towards Efficient and Secure Data Storage in Multi-tenant Cloud-Based CRM Solutions},
    url = {http://doi.ieeecomputersociety.org/10.1109/UCC.2015.107},
    year = 2015
    }

  • M. Aslam, C. Gehrmann, and M. Björkman, “ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies,” Journal of Information Security and Applications, vol. 22, pp. 28-39, 2015. doi:http://dx.doi.org/10.1016/j.jisa.2014.09.001
    [BibTeX] [Abstract] [Download PDF]

    "Abstract Many enterprise solutions today are built upon complex distributed systems which are accessible to the users globally. Due to this global access, the security of the host platforms becomes critical. The platform administrators use security automation techniques such as those provided by Security Content Automation Protocol (SCAP) standards to protect the systems from the vulnerabilities that are reported daily; furthermore, they are responsible for keeping their systems compliant to the relevant security recommendations (governmental or industrial). Additionally, third party audit and certification processes are used to increase user trust in enterprise solutions. However, traditional audit and certification mechanisms are not continuous, that is, not frequent enough to deal with the daily reported vulnerabilities, and for that matter even auditors expect platform administrators to keep the systems updated. As a result, the end user is also forced to trust the platform administrators about the latest state of the platform. In this paper we develop an automated security audit and certification system ( \{ASA\} r P ) which can be used by platform users or by third party auditors. We use security automation techniques for continuous monitoring of the platform security posture and make the results trustworthy by using trusted computing (TCG) techniques. The prototype development of \{ASA\} r P validates the implementation feasibility; it also provides performance benchmarks which show that the \{ASA\} r P based audit and certification can be done much more frequently (e.g. daily or weekly). The feasibility of \{ASA\} r P based continuous audits is significantly better than traditional platform audits which are dependent on the physical presence of the auditors, thus making frequent audits much more expensive and operationally infeasible. "

    @article{aslam2015asarp,
    abstract = {"Abstract Many enterprise solutions today are built upon complex distributed systems which are accessible to the users globally. Due to this global access, the security of the host platforms becomes critical. The platform administrators use security automation techniques such as those provided by Security Content Automation Protocol (SCAP) standards to protect the systems from the vulnerabilities that are reported daily; furthermore, they are responsible for keeping their systems compliant to the relevant security recommendations (governmental or industrial). Additionally, third party audit and certification processes are used to increase user trust in enterprise solutions. However, traditional audit and certification mechanisms are not continuous, that is, not frequent enough to deal with the daily reported vulnerabilities, and for that matter even auditors expect platform administrators to keep the systems updated. As a result, the end user is also forced to trust the platform administrators about the latest state of the platform. In this paper we develop an automated security audit and certification system ( \{ASA\} r P ) which can be used by platform users or by third party auditors. We use security automation techniques for continuous monitoring of the platform security posture and make the results trustworthy by using trusted computing (TCG) techniques. The prototype development of \{ASA\} r P validates the implementation feasibility; it also provides performance benchmarks which show that the \{ASA\} r P based audit and certification can be done much more frequently (e.g. daily or weekly). The feasibility of \{ASA\} r P based continuous audits is significantly better than traditional platform audits which are dependent on the physical presence of the auditors, thus making frequent audits much more expensive and operationally infeasible. "},
    author = {Aslam, Mudassar and Gehrmann, Christian and Björkman, Mats},
    doi = {http://dx.doi.org/10.1016/j.jisa.2014.09.001},
    interhash = {2265d13040f8167fb4879da52a51e3df},
    intrahash = {30184236d1bfa725d6ee73f90b5c3251},
    issn = {2214-2126},
    journal = {Journal of Information Security and Applications},
    note = {Special Issue on Security of Information and Networks },
    pages = {28-39},
    title = {ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies},
    url = {http://www.sciencedirect.com/science/article/pii/S2214212614001306},
    volume = 22,
    year = 2015
    }

  • J. Müller-Quade, M. Huber, and T. Nilges, “Daten verschlüsselt speichern und verarbeiten in der Cloud,” Datenschutz und Datensicherheit, vol. 39, pp. 531-535, 2015. doi:10.1007/s11623-015-0465-x
    [BibTeX] [Abstract] [Download PDF]

    Neue Anwendungsformen kryptografi scher Verfahren erlauben es, personenbezogene Daten über unterschiedliche Vertrauenszonen hinweg verschlüsselt zu verarbeiten und speichern. Die oft als heiliger Gral der Kryptographie bezeichnete voll-homomorphe Verschlüsselung ist theoretisch eine perfekte Lösung für den Datenschutz im Cloud Computing. Für den Einsatz in der Praxis ist sie jedoch bisher deutlich zu aufwändig. Eine Alternative sind Verfahren mit einer an die konkrete Anwendung angepassten Sicherheit.

    @article{mullerquade2015daten,
    abstract = {Neue Anwendungsformen kryptografi scher Verfahren erlauben es, personenbezogene Daten über unterschiedliche Vertrauenszonen hinweg verschlüsselt zu verarbeiten und speichern. Die oft als heiliger Gral der Kryptographie bezeichnete voll-homomorphe Verschlüsselung ist theoretisch eine perfekte Lösung für den Datenschutz im Cloud Computing. Für den Einsatz in der Praxis ist sie jedoch bisher deutlich zu aufwändig. Eine Alternative sind Verfahren mit einer an die konkrete Anwendung angepassten Sicherheit.},
    author = {Müller-Quade, Jörn and Huber, Matthias and Nilges, Tobias},
    doi = {10.1007/s11623-015-0465-x},
    interhash = {5802696cf389a7ec39fb71cdc3fe8181},
    intrahash = {55a4c28d6690a93af3b46cd10a2bd7db},
    issn = {1862-2607},
    journal = {Datenschutz und Datensicherheit},
    pages = {531-535},
    title = {Daten verschlüsselt speichern und verarbeiten in der Cloud},
    url = {http://dx.doi.org/10.1007/s11623-015-0465-x},
    volume = 39,
    year = 2015
    }

  • G. Schiefer, “Sicherer mobiler Zugriff auf Unternehmensdaten,” PhD Thesis, Karslruhe Institut für Technologie (KIT), 2015.
    [BibTeX] [Abstract]

    Mobile Unternehmensanwendungen können einen großen Mehrwert für Unternehmen darstellen, sind jedoch auch mit erheblichem Aufwand verbunden. Durch die Öffnung der Unternehmens-IT für mobile Mitarbeiter entstehen zusätzliche Sicherheitsrisiken, welchen angemessen begegnet werden muss. Die Dissertation stellt eine Architektur und ein Zugriffsmodell vor, bei dem durch eine Mehr-Faktoren-Authentifizierung bei jeder Datenanfrage ein signifikant höheres Sicherheitsniveau erreicht werden kann. Dazu wird zuerst die Entwicklung mobilgeeigneter Dienste betrachtet. In einem mehrstufigen Verfahren werden die Anforderungen von Unternehmen für mobile SaaS-Anwendungen erhoben. Ausgehend von einer Analyse gescheiterter Dienste werden eine qualitative Datenanalyse und darauf aufbauend eine Expertenbefragung durchgeführt. Neben der Darstellung von anderen Lösungsansätzen für hoch-mobile Geräte wird eine mit Forschungspartnern umgesetzte eigene Lösung dargestellt und evaluiert. Im nächsten Teil wird eine zusätzliche Absicherung des mobilen Zugriffs über Smartcards und kontextabhängige Zugriffskontrolle vorgestellt. Dazu werden Bedrohungen und Sicherheitsanforderungen erhoben. Daraus wird eine Architektur entwickelt, welche eine 3-Faktor-Authentifizierung mittels Hardware-Sicherheits-Token (Smartcard) und Kontextinformationen realisiert. Diese Architektur ermöglicht es, nicht nur zu Beginn einer Sitzung die Zugangsberechtigung zu prüfen, sondern während der Nutzung eine permanente Berechtigungsüberprüfung durchzuführen, ohne den Nutzer bei der Arbeit zu stören. Darüber hinaus können Unternehmensdaten neben den statischen Zugangsberechtigungen um kontextabhängige Berechtigungen erweitert werden, um die Kontrolle über den Datenzugriff situationsabhängig zu gestalten. Zur Modellierung der kontextsensitiven Zugriffskontrolle werden bestehende Zugriffskontrollmodelle beleuchtet und ein Discretionary Acces Controll-Modell um die kontextabhängige Zugriffsbeschreibung erweitert. Die Architektur wurde in einem Demonstrator umgesetzt, mit dem der Einsatz von Hardware-Sicherheits-Token evaluiert wurde.

    @phdthesis{schiefer2015sicherer,
    abstract = {Mobile Unternehmensanwendungen können einen großen Mehrwert für Unternehmen darstellen, sind jedoch auch mit erheblichem Aufwand verbunden. Durch die Öffnung der Unternehmens-IT für mobile Mitarbeiter entstehen zusätzliche Sicherheitsrisiken, welchen angemessen begegnet werden muss. Die Dissertation stellt eine Architektur und ein Zugriffsmodell vor, bei dem durch eine Mehr-Faktoren-Authentifizierung bei jeder Datenanfrage ein signifikant höheres Sicherheitsniveau erreicht werden kann.
    Dazu wird zuerst die Entwicklung mobilgeeigneter Dienste betrachtet. In einem mehrstufigen Verfahren werden die Anforderungen von Unternehmen für mobile SaaS-Anwendungen erhoben. Ausgehend von einer Analyse gescheiterter Dienste werden eine qualitative Datenanalyse und darauf aufbauend eine Expertenbefragung durchgeführt. Neben der Darstellung von anderen Lösungsansätzen für hoch-mobile Geräte wird eine mit Forschungspartnern umgesetzte eigene Lösung dargestellt und evaluiert.
    Im nächsten Teil wird eine zusätzliche Absicherung des mobilen Zugriffs über Smartcards und kontextabhängige Zugriffskontrolle vorgestellt. Dazu werden Bedrohungen und Sicherheitsanforderungen erhoben. Daraus wird eine Architektur entwickelt, welche eine 3-Faktor-Authentifizierung mittels Hardware-Sicherheits-Token (Smartcard) und Kontextinformationen realisiert. Diese Architektur ermöglicht es, nicht nur zu Beginn einer Sitzung die Zugangsberechtigung zu prüfen, sondern während der Nutzung eine permanente Berechtigungsüberprüfung durchzuführen, ohne den Nutzer bei der Arbeit zu stören. Darüber hinaus können Unternehmensdaten neben den statischen Zugangsberechtigungen um kontextabhängige Berechtigungen erweitert werden, um die Kontrolle über den Datenzugriff situationsabhängig zu gestalten. Zur Modellierung der kontextsensitiven Zugriffskontrolle werden bestehende Zugriffskontrollmodelle beleuchtet und ein Discretionary Acces Controll-Modell um die kontextabhängige Zugriffsbeschreibung erweitert. Die Architektur wurde in einem Demonstrator umgesetzt, mit dem der Einsatz von Hardware-Sicherheits-Token evaluiert wurde.},
    author = {Schiefer, Gunther},
    institution = {Karslruhe Institut für Technologie (KIT)},
    interhash = {40621c3ff4e95b5dca362ac2b09f8efd},
    intrahash = {ee558889d90a9e422483e799af27d0eb},
    pages = 336,
    title = {Sicherer mobiler Zugriff auf Unternehmensdaten},
    year = 2015
    }

  • M. Brunner, “Architektur eines relationalen Datenbanksystems zur verschlüsselten und verteilten Datenspeicherung in der Cloud,” Master Thesis, Karlsruhe Institute of Technologies (KIT), 2015.
    [BibTeX]
    @mastersthesis{brunner2015architektur,
    author = {Brunner, Maximilian},
    institution = {Karlsruhe Institute of Technologies (KIT)},
    interhash = {a47ac185dd5230eb1d69d5693780a5c6},
    intrahash = {342f91666fe743eae00d0356d0f0c427},
    month = {March},
    pages = 36,
    title = {Architektur eines relationalen Datenbanksystems zur verschlüsselten und verteilten Datenspeicherung in der Cloud},
    year = 2015
    }