Selected Publications

Cloud computing provides many advantages for both the cloud service provider and the clients. It is also infamous for being highly dynamic and for having numerous security issues. The dynamicity of cloud computing implies that dynamic security mechanisms are being employed to enforce its security, especially in regards to access decisions. However, this is surprisingly not the case. Static traditional authorization mechanisms are being used in cloud environments, leading to legitimate doubts on their ability to fulfill the security needs of the cloud. We propose a risk adaptive authorization mechanism (RAdAM) for a simple cloud deployment, collaboration in cloud computing and federation in cloud computing. We use a fuzzy inference system to demonstrate the practicability of RAdAM. We complement RAdAM with a Vulnerability Based Authorization Mechanism (VBAM) which is a real-time autho- rization model based on the average vulnerability scores of the objects present in the cloud. We demonstrated the usefulness of VBAM in a use case featuring OpenStack.
In JIP, 2016

Cloud computing has revolutionized information technology, in that It allows enterprises and users to lower computing expenses by outsourcing their needs to a cloud service provider. However, despite all the benefits it brings, cloud computing raises several security concerns that have not yet been fully addressed to a satisfactory note. Indeed, by outsourcing its operations, a client surrenders control to the service provider and needs assurance that data is dealt with in an appropriate manner. Furthermore, the most inherent security issue of cloud computing is multi-tenancy. Cloud computing is a shared platform where users’ data are hosted in the same physical infrastructure. A malicious user can exploit this fact to steal the data of the users whom he or she is sharing the platform with. To address the aforementioned security issues, we propose a security risk quantification method that will allow users and cloud com- puting administrators to measure the security level of a given cloud ecosystem. Our risk quantification method is an adaptation of the fault tree analysis, which is a modeling tool that has proven to be highly effective in mission-critical systems. We replaced the faults by the probable vulnerabilities in a cloud system, and with the help of the common vulnerability scoring system, we were able to generate the risk formula. In addition to addressing the previously men- tioned issues, we were also able to quantify the security risks of a popular cloud management stack, and propose an architecture where users can evaluate and rank different cloud service providers.
In JIP, 2015

Recent Publications

. Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment. In Hindawi, 2018.

Source Document

. Fault Tree Analysis-based Risk Quantification of Smart Homes. In INCIT2017, 2017.

PDF

. Securing Low-Computational Power Devices against ARP Spoofing Attacks through a Lightweight Android Application. In ICSEC2017, 2017.

. UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App. In AsiaJCS, 2017.

PDF

Contact

  • doudou-f_at_is(dot)naist(dot)jp
  • Laboratory for Cyber Resilience, Division of Information Science, Nara Institute of Science and Technology, 3rd Floor in Bldg. A, 8916-5 Takayama, Ikoma, Nara, 630-0192, JAPAN