Cloud Computing Module-4
Cloud Computing Module-4
1. Protection Against Malicious Attacks: An OS protects applications from unauthorized access, code
tampering, and spoofing, safeguarding sensitive information and resources.
2. Mandatory Security Policies: Security policies are defined and enforced by system administrators,
ensuring strict access control, authentication, and cryptographic mechanisms.
3. Trusted Applications: Applications with special privileges, performing security-related functions, are
restricted to the minimum required privileges to reduce risks.
4. Mandatory vs. Discretionary Security: Mandatory security is system-controlled, while discretionary
security depends on users, increasing the risk of breaches due to user error or negligence.
5. Trusted Path Mechanism: OS security requires trusted paths to prevent malicious software from
impersonating trusted applications or tampering with security attributes.
6. Decomposed Security Components: Security mechanisms, such as access control, are divided into
components like enforcers and deciders to enhance security and functionality.
7. Mobile Code Protection: Mechanisms like Java Security Manager attempt to confine malicious mobile
code but have limitations, such as vulnerabilities in the JVM or file system.
8. Specialized Platforms: Closed-box platforms (e.g., ATMs and game consoles) embed cryptographic
keys for identity verification, unlike open-box platforms used in general-purpose computing.
9. Application-Specific Security: Security beyond the OS, tailored to specific applications, can offer
stronger safeguards, such as digital signatures in e-commerce transactions.
10. Challenges in Commodity OS: Commodity OSs are complex, with millions of lines of code, weak
application isolation, and limited authentication mechanisms, making them vulnerable to attacks and
reducing overall platform security.
4. VM SECURITY
1. Virtual Machine Monitor (VMM) Role: The VMM controls access to hardware, enforces memory
isolation, and regulates disk and network access, providing stronger isolation than traditional operating
systems.
2. Trusted Computing Base (TCB): A secure TCB is essential for VM security; its compromise affects
the entire virtual system's security.
3. Security Services by VMM: The VMM can save, restore, clone, and encrypt the state of guest VMs,
enabling security features like replication for reliability and cloning for malware analysis.
4. Inter-VM Communication: Communication between VMs is faster than between physical machines,
allowing strategies like moving guest VM files to a dedicated VM for added protection.
5. Challenges in Higher-Level Security: The VMM operates at a low level (e.g., managing disk blocks),
while security services often require higher-level information (e.g., files).
6. Threats to VM and VMM:
a. VMM-Based Threats:
i. Resource Starvation/Denial of Service: Misconfigured resource limits or rogue VMs
bypassing controls.
ii. Side-Channel Attacks: Exploitation of inter-VM traffic due to misconfigurations or
insecure VM images.
iii. Buffer Overflow Attacks: Exploiting vulnerabilities in VM systems.
b. VM-Based Threats:
i. Rogue or Insecure VM Deployment: Creation of insecure VM instances due to poor
access control.
ii. Insecure VM Images: Lack of integrity checks or access controls for VM image
repositories.
7. Intrusion Detection and Prevention: VM-based systems like Livewire, Siren, and IntroVirt leverage
isolation, inspection (state review), and interposition (trapping and emulating privileged instructions).
8. VM Honeypots: Cloning systems can test for malicious behaviors, but sophisticated attackers may
avoid these honeypots or attempt to access sensitive logging files.
9. Security Trade-Offs: Enhanced security through virtualization comes with costs, including higher
resource requirements, development complexity, and performance overheads.
10. Prevention Strategies:
a. Ensure proper configuration of resource limits and access controls.
b. Regularly patch VM images and verify their integrity.
c. Use digital signatures for VM image repositories.
d. Implement VMM-based intrusion detection and prevention systems.