Cyber defenses for physical attacks and insider threats in cloud computing

Jakub Szefer, Pramod Jamkhedkar, Diego Perez-Botero, Ruby B. Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Abstract

In cloud computing, most of the computations and data in the data center do not belong to the cloud provider. This leaves owners of applications and data concerned about cyber and physical attacks which may compromise the confidentiality, integrity or availability of their applications or data. While much work has looked at protection from software (cyber) threats, very few have looked at physical attacks and physical security in data centers. In this work, we present a novel set of cyber defense strategies for physical attacks in data centers. We capitalize on the fact that physical attackers are constrained by the physical layout and other features of a data center which provide a time delay before an attacker can reach a server to launch a physical attack, even by an insider. We describe how a number of cyber defense strategies can be activated when an attack is detected, some of which can even take effect before the actual attack occurs. The defense strategies provide improved security and are more cost-effective than always-on protections in the light of the fact that on average physical attacks will not happen often - but can be very damaging when they do occur.

Original languageEnglish (US)
Title of host publicationASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
PublisherAssociation for Computing Machinery, Inc
Pages519-524
Number of pages6
ISBN (Electronic)9781450328005
DOIs
StatePublished - Jun 4 2014
Event9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2014 - Kyoto, Japan
Duration: Jun 4 2014Jun 6 2014

Publication series

NameASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security

Other

Other9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2014
Country/TerritoryJapan
CityKyoto
Period6/4/146/6/14

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems

Keywords

  • Cloning
  • Cloud computing
  • Data center security
  • Insider threats
  • Migration
  • Physical attacks
  • Virtual machines

Fingerprint

Dive into the research topics of 'Cyber defenses for physical attacks and insider threats in cloud computing'. Together they form a unique fingerprint.

Cite this