메뉴 건너뛰기




Volumn 32, Issue 9 A, 2011, Pages 184-203

Research on key problems of covert channel in cloud computing

Author keywords

Cloud computing; Cloud security; Covert channel; Covert channel evaluation; Covert channel identification; Scenario construction; Virtual technology

Indexed keywords

COVERT CHANNELS; ENGINEERING PRACTICES; IDENTIFICATION AND EVALUATION; SECURITY CRITERION; THEORETICAL RESEARCH; VIRTUAL TECHNOLOGY;

EID: 81355163423     PISSN: 1000436X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (6)

References (102)
  • 1
    • 80052945517 scopus 로고    scopus 로고
    • Group of Virtualization and Cloud Computing. Beijing: Publishing House of Electronics Industry
    • Group of Virtualization and Cloud Computing. Virtualization and Cloud Computing [M]. Beijing: Publishing House of Electronics Industry, 2009.
    • (2009) Virtualization and Cloud Computing
  • 2
    • 65749084065 scopus 로고    scopus 로고
    • Cloud computing: System instances and current research
    • CHAN K, ZHENG W M. Cloud computing: system instances and current research [J]. Journal of Software, 2009, 20(5): 1337-1348.
    • (2009) Journal of Software , vol.20 , Issue.5 , pp. 1337-1348
    • Chan, K.1    Zheng, W.M.2
  • 3
    • 54049106582 scopus 로고    scopus 로고
    • Virtual machine introspection: Observation or interference
    • NANCE K, BISHOP M, HAY B. Virtual machine introspection: observation or interference? [J]. IEEE Security and Privacy, 2008, 6(5): 32-37.
    • (2008) IEEE Security and Privacy , vol.6 , Issue.5 , pp. 32-37
    • Nance, K.1    Bishop, M.2    Hay, B.3
  • 4
    • 77954051808 scopus 로고    scopus 로고
    • The nist definition of cloud computing
    • National Institute of Standards and Technology
    • MELL P, GRANCE T. The Nist Definition of Cloud Computing [S]. National Institute of Standards and Technology, 2009,
    • (2009)
    • Mell, P.1    Grance, T.2
  • 7
    • 51949119355 scopus 로고    scopus 로고
    • sHype: Secure hypervisor approach to trusted virtualized systems
    • IBM Research Report RC23511
    • SAILER R, VALDEZ E, JAEGER T, et al. sHype: Secure Hypervisor Approach to Trusted Virtualized Systems [R]. IBM Research Report RC23511, 2005, 1-12.
    • (2005) , pp. 1-12
    • Sailer, R.1    Valdez, E.2    Jaeger, T.3
  • 8
    • 38349041413 scopus 로고    scopus 로고
    • A layered approach to simplified access control in virtualized systems
    • PAYNE B D, SAILER R, CACERES R, et al. A layered approach to simplified access control in virtualized systems [J]. SIGOPS Oper Syst Rev, 2007, 41(4): 12-19.
    • (2007) SIGOPS Oper Syst Rev , vol.41 , Issue.4 , pp. 12-19
    • Payne, B.D.1    Sailer, R.2    Caceres, R.3
  • 10
  • 11
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • BUTLER W L. A note on the confinement problem [J]. Commun ACM, 1973, 16(10): 613-615.
    • (1973) Commun ACM , vol.16 , Issue.10 , pp. 613-615
    • Butler, W.L.1
  • 14
    • 65349144517 scopus 로고    scopus 로고
    • New definition of small message criterion and its application in transaction covert channel mitigating
    • ZENG H T, WANG Y J, ZU W, et al. New definition of small message criterion and its application in transaction covert channel mitigating [J]. Journal of Software, 2009, 20(4): 985-996.
    • (2009) Journal of Software , vol.20 , Issue.4 , pp. 985-996
    • Zeng, H.T.1    Wang, Y.J.2    Zu, W.3
  • 15
    • 51649119359 scopus 로고    scopus 로고
    • Covert channel mitigation method for secure real-time database using capacity metric
    • ZENG H T, WANG Y J, RUAN L, et al. Covert channel mitigation method for secure real-time database using capacity metric [J]. Journal on Communications, 2008, 29(8): 46-56.
    • (2008) Journal on Communications , vol.29 , Issue.8 , pp. 46-56
    • Zeng, H.T.1    Wang, Y.J.2    Ruan, L.3
  • 16
    • 44449087948 scopus 로고    scopus 로고
    • A survey of covert channels and countermeasures in computer network protocols
    • ZANDER S, ARMITAGE G, BRANCH P. A survey of covert channels and countermeasures in computer network protocols [J]. Communications Surveys & Tutorials, IEEE, 2007, 9(3): 44-57.
    • (2007) Communications Surveys & Tutorials, IEEE , vol.9 , Issue.3 , pp. 44-57
    • Zander, S.1    Armitage, G.2    Branch, P.3
  • 21
    • 70349733402 scopus 로고    scopus 로고
    • Covert channels in ad-hoc wireless networks
    • LI S, EPHREMIDES A. Covert channels in ad-hoc wireless networks [J]. Ad Hoc Netw, 2010, 8(2): 135-147.
    • (2010) Ad Hoc Netw , vol.8 , Issue.2 , pp. 135-147
    • Li, S.1    Ephremides, A.2
  • 22
  • 23
    • 12844265899 scopus 로고    scopus 로고
    • Covert channel analysis in secure operating systems with high security levels
    • QING S H. Covert channel analysis in secure operating systems with high security levels [J]. Journal of Software, 2004, 15(12): 1837-1849.
    • (2004) Journal of Software , vol.15 , Issue.12 , pp. 1837-1849
    • Qing, S.H.1
  • 24
  • 26
    • 78650404228 scopus 로고    scopus 로고
    • Covert channel resistant information leakage protection using a multi-agent architecture
    • BISHOP S, OKHRAVI H, RAHIMI S, et al. Covert channel resistant information leakage protection using a multi-agent architecture [J]. Information Security, IET, 2010, 4(4): 233-247.
    • (2010) Information Security, IET , vol.4 , Issue.4 , pp. 233-247
    • Bishop, S.1    Okhravi, H.2    Rahimi, S.3
  • 28
    • 77953309328 scopus 로고    scopus 로고
    • On adversarial games in dynamic spectrum access networking based covert timing channels
    • SENGUPTA S, ANAND S, HONG K, et al. On adversarial games in dynamic spectrum access networking based covert timing channels? [J]. SIGMOBILE Mob Comput Commun Rev, 2009, 13(2): 96-107.
    • (2009) SIGMOBILE Mob Comput Commun Rev , vol.13 , Issue.2 , pp. 96-107
    • Sengupta, S.1    Anand, S.2    Hong, K.3
  • 29
    • 0004226996 scopus 로고    scopus 로고
    • Beijing: New Start Press
    • KELLY K. Out of Control [M]. Beijing: New Start Press, 2010.
    • (2010) Out of Control
    • Kelly, K.1
  • 30
    • 44649194096 scopus 로고    scopus 로고
    • Cloud computing
    • IBM Whitepaper
    • BOSS G, MALLADI P, QUAN D, et al. Cloud computing [R]. IBM Whitepaper. 2007.
    • (2007)
    • Boss, G.1    Malladi, P.2    Quan, D.3
  • 31
    • 81355126572 scopus 로고    scopus 로고
    • UCB/EECS-2009-28. EECS Department, University of California, Berkeley
    • ARMBRUST M, FOX A, GRIFFITH R, et al. UCB/EECS-2009-28 [R]. EECS Department, University of California, Berkeley, 2009.
    • (2009)
    • Armbrust, M.1    Fox, A.2    Griffith, R.3
  • 32
    • 77950347409 scopus 로고    scopus 로고
    • A view of cloud computing
    • ARMBRUST M, FOX A, GRIFFITH R, et al. A view of cloud computing [J]. Commun ACM, 2010, 53(4): 50-58.
    • (2010) Commun ACM , vol.53 , Issue.4 , pp. 50-58
    • Armbrust, M.1    Fox, A.2    Griffith, R.3
  • 33
    • 65749112026 scopus 로고    scopus 로고
    • Amazon elastic compute cloud (Amazon EC2)
    • Amazon elastic compute cloud (Amazon EC2) [EB/OL]. http://aws.amazon.com/ec2/. 2009.
    • (2009)
  • 34
    • 84863179597 scopus 로고    scopus 로고
    • Google app engine
    • Google app engine [EB/OL]. http://code.google.com/appengine/. 2009.
    • (2009)
  • 35
    • 81355126569 scopus 로고    scopus 로고
    • Business CRM solutions
    • Business CRM Solutions [EB/OL]. http://www.salesforce.com/crm/.
  • 36
    • 81355137387 scopus 로고    scopus 로고
    • UCB/EECS-2010-5: EECS Department, University of California, Berkeley
    • CHEN Y, PAXSON V, KATZ R H. UCB/EECS-2010-5 [R]: EECS Department, University of California, Berkeley, 2010.
    • (2010)
    • Chen, Y.1    Paxson, V.2    Katz, R.H.3
  • 37
    • 79751493181 scopus 로고    scopus 로고
    • Locking the sky: A survey on IaaS cloud security
    • VAQUERO L, RODERO-MERINO L, MOR N D. Locking the sky: a survey on IaaS cloud security [J]. Computing, 2011, 91(1): 93-118.
    • (2011) Computing , vol.91 , Issue.1 , pp. 93-118
    • Vaquero, L.1    Rodero-Merino, L.2    Mor, N.D.3
  • 38
    • 50249101677 scopus 로고    scopus 로고
    • Lares: An architecture for secure active monitoring using virtualization
    • Oakland, CA
    • PAYNE B D, CARBONE M, SHARIF M, et al. Lares: an architecture for secure active monitoring using virtualization [A]. 2008 IEEE Symposium on Security and Privacy [C]. Oakland, CA, 2008. 233-247.
    • (2008) 2008 IEEE Symposium on Security and Privacy , pp. 233-247
    • Payne, B.D.1    Carbone, M.2    Sharif, M.3
  • 39
    • 79951999348 scopus 로고    scopus 로고
    • Study on cloud computing security
    • FENG D G, ZHANG M, ZHANG Y, et al. Study on cloud computing security [J]. Journal of Software, 2011, 22(1): 71-83.
    • (2011) Journal of Software , vol.22 , Issue.1 , pp. 71-83
    • Feng, D.G.1    Zhang, M.2    Zhang, Y.3
  • 40
    • 41949123110 scopus 로고    scopus 로고
    • Research and development of botnets
    • ZHUGE J W, HAN X H, ZHOU Y L, et al. Research and development of botnets [J]. Journal of Software, 2008, 19(3): 702-715.
    • (2008) Journal of Software , vol.19 , Issue.3 , pp. 702-715
    • Zhuge, J.W.1    Han, X.H.2    Zhou, Y.L.3
  • 42
    • 77955197190 scopus 로고    scopus 로고
    • Side-channel leaks in web applications: A reality today, a challenge tomorrow
    • CHEN S, WANG R, WANG X, et al.Side-channel leaks in web applications: a reality today, a challenge tomorrow [A]. 2010 IEEE Symposium on Security and Privacy [C]. 2010. 191-206.
    • (2010) 2010 IEEE Symposium on Security and Privacy , pp. 191-206
    • Chen, S.1    Wang, R.2    Wang, X.3
  • 43
    • 77955212682 scopus 로고    scopus 로고
    • HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • WANG Z, JIANG X. HyperSafe: a lightweight approach to provide lifetime hypervisor control-flow integrity [A]. 2010 IEEE Symposium on Security and Privacy [C]. 2010. 380-395.
    • (2010) 2010 IEEE Symposium on Security and Privacy , pp. 380-395
    • Wang, Z.1    Jiang, X.2
  • 44
    • 0003969633 scopus 로고
    • Trusted computer system evaluation criteria
    • CENTER N C S. Trusted Computer System Evaluation Criteria [S]. 1985.
    • (1985)
    • Center, N.C.S.1
  • 45
    • 0003765587 scopus 로고    scopus 로고
    • Common criteria for information technology security evaluation
    • ISO/IEC. ISO Online Catalogue
    • ISO/IEC. Common Criteria for Information Technology Security Evaluation [S]. ISO Online Catalogue, 2005.
    • (2005)
  • 46
    • 77957969551 scopus 로고    scopus 로고
    • Classified oriteria for security protection of computer information system
    • GB17859-1999
    • GB17859-1999. Classified Oriteria for Security Protection of Computer Information System [S]. 2001.
    • (2001)
  • 47
    • 58149161807 scopus 로고    scopus 로고
    • Information security technology - Security techniques requirement for operating system
    • GB/T20272-2006
    • GB/T20272-2006. Information Security Technology - Security Techniques Requirement for Operating System [S]. 2006.
    • (2006)
  • 48
    • 84948947266 scopus 로고    scopus 로고
    • A practical approach to identifying storage and timing channels: Twenty years later
    • LAS VEGAS, NV
    • KEMMERER R A. A practical approach to identifying storage and timing channels: twenty years later [A]. 18th Annual Computer Security Applications Conference [C]. LAS VEGAS, NV, 2002. 109-118.
    • (2002) 18th Annual Computer Security Applications Conference , pp. 109-118
    • Kemmerer, R.A.1
  • 49
    • 0026260664 scopus 로고
    • Covert flow trees: A visual approach to analyzing covert storage channels
    • KEMMERER R A, PORRAS P A. Covert flow trees: a visual approach to analyzing covert storage channels [J]. IEEE Transactions on Software Engineering. 1991, 17(11): 1166-1185.
    • (1991) IEEE Transactions on Software Engineering , vol.17 , Issue.11 , pp. 1166-1185
    • Kemmerer, R.A.1    Porras, P.A.2
  • 50
    • 84976667065 scopus 로고
    • Shared resource matrix methodology: An approach to identifying storage and timing channels
    • KEMMERER R A. Shared resource matrix methodology: an approach to identifying storage and timing channels [J]. ACM Trans Comput Syst, 1983, 1(3): 256-277.
    • (1983) ACM Trans Comput Syst , vol.1 , Issue.3 , pp. 256-277
    • Kemmerer, R.A.1
  • 52
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • DENNING D E. A lattice model of secure information flow [J]. Commun ACM, 1976, 19(5): 236-243.
    • (1976) Commun ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 53
    • 8644251330 scopus 로고    scopus 로고
    • Covet channel analysis on ANSHENG secure operating system
    • QING S H, ZHU J F. Covet channel analysis on ANSHENG secure operating system [J]. Journal of Software, 2004, 15(09): 1385-1392.
    • (2004) Journal of Software , vol.15 , Issue.9 , pp. 1385-1392
    • Qing, S.H.1    Zhu, J.F.2
  • 56
    • 77957960630 scopus 로고    scopus 로고
    • Research on covert channel measurement and handling in secure real-time database
    • BeiJing; Graduate School of the Chinese Academy of Sciences
    • ZENG H T. Research on Covert Channel Measurement and Handling in Secure Real-time Database [D]. BeiJing; Graduate School of the Chinese Academy of Sciences, 2008.
    • (2008)
    • Zeng, H.T.1
  • 57
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • MITRE CORP
    • BELL D, LA PADULA L. Secure Computer Systems: Mathematical Foundations [R]. MITRE CORP, 1973.
    • (1973)
    • Bell, D.1    La Padula, L.2
  • 67
    • 38049087058 scopus 로고    scopus 로고
    • Detection of covert channel encoding in network packet delays
    • Department of Computer Science, Dartmouth College, Technical Report TR2005536
    • BERK V, GIANI A, CYBENKO G, et al. Detection of Covert Channel Encoding in Network Packet Delays [R]. Department of Computer Science, Dartmouth College, Technical Report TR2005536, 2005
    • (2005)
    • Berk, V.1    Giani, A.2    Cybenko, G.3
  • 69
    • 71849083789 scopus 로고    scopus 로고
    • A study of on/off timing channel based on packet delay distribution
    • YAO L, ZI X, PAN L, et al. A study of on/off timing channel based on packet delay distribution [J]. Computers & Security, 2009, 28(8): 785-794.
    • (2009) Computers & Security , vol.28 , Issue.8 , pp. 785-794
    • Yao, L.1    Zi, X.2    Pan, L.3
  • 72
    • 2642558406 scopus 로고    scopus 로고
    • Covert channels in the TCP/IP protocol suite, First Monday
    • 1997-5-5
    • ROWLAND C. Covert channels in the TCP/IP protocol suite, First Monday [EB/OL]. http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/ fm/article/viewArticle/528/449, 1997-5-5.
    • Rowland, C.1
  • 73
    • 77955419362 scopus 로고    scopus 로고
    • Implementing a passive network covert timing channel
    • ZI X, YAO L, PAN L, et al. Implementing a passive network covert timing channel [J]. Computers & Security, 2010, 29(6): 686-696.
    • (2010) Computers & Security , vol.29 , Issue.6 , pp. 686-696
    • Zi, X.1    Yao, L.2    Pan, L.3
  • 74
    • 70349682314 scopus 로고    scopus 로고
    • TCP/IP timing channels: Theory to implementation
    • Brizal
    • SELLKE S H, CHIH-CHUN W, BAGCHI S, et al. TCP/IP timing channels: theory to implementation [A]. 2009 INFOCOM [C]. Brizal, 2009. 2204-2212.
    • (2009) 2009 INFOCOM , pp. 2204-2212
    • Sellke, S.H.1    Chih-Chun, W.2    Bagchi, S.3
  • 75
    • 70350353526 scopus 로고    scopus 로고
    • Hide and seek in time-robust covert timing channels
    • LNCS 5789
    • LIU Y, GHOSAL D, ARMKNECHT F, et al. Hide and seek in time-robust covert timing channels [A]. ESORICS 2009 [C]. LNCS 5789. 2009. 120-135.
    • (2009) ESORICS 2009 , pp. 120-135
    • Liu, Y.1    Ghosal, D.2    Armknecht, F.3
  • 76
    • 38049169779 scopus 로고    scopus 로고
    • Noisy timing channels with binary inputs and outputs
    • IH 2006, LNCS 4437
    • MARTIN K, MOSKOWITZ I. Noisy timing channels with binary inputs and outputs [J]. IH 2006, LNCS 4437 [C]. 2007. 124-144.
    • (2007) , pp. 124-144
    • Martin, K.1    Moskowitz, I.2
  • 77
    • 70350213805 scopus 로고    scopus 로고
    • A method for the construction of minimum-redundancy codes
    • HUFFMAN D. A method for the construction of minimum-redundancy codes [J]. Resonance, 2006, 11(2): 91-99.
    • (2006) Resonance , vol.11 , Issue.2 , pp. 91-99
    • Huffman, D.1
  • 81
    • 67649823284 scopus 로고    scopus 로고
    • A formal framework for real-time information flow analysis
    • SON J, ALVES-FOSS J. A formal framework for real-time information flow analysis [J]. Computers & Security, 2009, 28(6): 421-432.
    • (2009) Computers & Security , vol.28 , Issue.6 , pp. 421-432
    • Son, J.1    Alves-Foss, J.2
  • 83
    • 0036715113 scopus 로고    scopus 로고
    • An information-theoretic and game-theoretic study of timing channels
    • GILES J, HAJEK B. An information-theoretic and game-theoretic study of timing channels [J]. IEEE Transactions on information Theory, 2002, 48(9): 2455-2477.
    • (2002) IEEE Transactions on information Theory , vol.48 , Issue.9 , pp. 2455-2477
    • Giles, J.1    Hajek, B.2
  • 87
    • 0023855640 scopus 로고
    • A bandwidth computation model for covert storage channels and its applications
    • Oakland, CA
    • TSAI C-R, GLIGOR V D. A bandwidth computation model for covert storage channels and its applications [A]. IEEE Symposium on Security and Privacy [C]. Oakland, CA, 1988. 108-121.
    • (1988) IEEE Symposium on Security and Privacy , pp. 108-121
    • Tsai, C.-R.1    Gligor, V.D.2
  • 88
    • 0036494997 scopus 로고    scopus 로고
    • Maintaining security and timeliness in real-time database system
    • AHMED Q N, VRBSKY S V. Maintaining security and timeliness in real-time database system [J]. Journal of Systems and Software, 2002, 61(1): 15-29.
    • (2002) Journal of Systems and Software , vol.61 , Issue.1 , pp. 15-29
    • Ahmed, Q.N.1    Vrbsky, S.V.2
  • 89
    • 0028566761 scopus 로고
    • Covert channels - here to stay
    • MOSKOWITZ I S, KANG M H. Covert channels - here to stay? [A]. COMPASS'94 [C]. 1994. 235-243.
    • (1994) COMPASS'94 , pp. 235-243
    • Moskowitz, I.S.1    Kang, M.H.2
  • 90
    • 77957962695 scopus 로고    scopus 로고
    • Open cloud manifesto
    • MANIFESTO O C. Open cloud manifesto [EB/OL]. www.opencloudmanifesto.org. 2009.
    • (2009)
    • Manifesto, O.C.1
  • 91
    • 78650052308 scopus 로고    scopus 로고
    • An In-VM measuring framework for increasing virtual machine security in clouds
    • LIU Q, WENG C, LI M, et al. An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds [J]. IEEE Security and Privacy, 2010, 8(6): 56-62.
    • (2010) IEEE Security and Privacy , vol.8 , Issue.6 , pp. 56-62
    • Liu, Q.1    Weng, C.2    Li, M.3
  • 92
    • 21644455412 scopus 로고    scopus 로고
    • Terra: A virtual machine-based platform for trusted computing
    • GARFINKEL T, PFAFF B, CHOW J, et al. Terra: a virtual machine-based platform for trusted computing [J]. SIGOPS Oper Syst Rev, 2003, 37(5): 193-206.
    • (2003) SIGOPS Oper Syst Rev , vol.37 , Issue.5 , pp. 193-206
    • Garfinkel, T.1    Pfaff, B.2    Chow, J.3
  • 94
    • 70449824733 scopus 로고    scopus 로고
    • SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
    • SESHADRI A, LUK M, QU N, et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes [J]. SIGOPS Oper Syst Rev, 2007, 41(6): 335-350.
    • (2007) SIGOPS Oper Syst Rev , vol.41 , Issue.6 , pp. 335-350
    • Seshadri, A.1    Luk, M.2    Qu, N.3
  • 95
    • 70450080729 scopus 로고    scopus 로고
    • Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
    • Lisbon, Portugal
    • KIL C, SEZER E C, AZAB A M, et al. Remote attestation to dynamic system properties: Towards providing complete system integrity evidence [A]. DSN 2009 [C]. Lisbon, Portugal, 2009. 115-124.
    • (2009) DSN 2009 , pp. 115-124
    • Kil, C.1    Sezer, E.C.2    Azab, A.M.3
  • 96
    • 84855404052 scopus 로고    scopus 로고
    • Hypervisor support for identifying covertly executing binaries
    • San Jose, CA
    • LITTY L, ANDRES H, LIE D. Hypervisor support for identifying covertly executing binaries [A]. USENIX Security Symposium [C]. San Jose, CA, 2008. 243-258.
    • (2008) USENIX Security Symposium , pp. 243-258
    • Litty, L.1    Andres, H.2    Lie, D.3
  • 98
    • 77953210383 scopus 로고    scopus 로고
    • seL4: Formal verification of an operating-system kernel
    • KLEIN G, ANDRONICK J, ELPHINSTONE K, et al. seL4: formal verification of an operating-system kernel [J]. Commun ACM, 2010, 53(6): 107-15.
    • (2010) Commun ACM , vol.53 , Issue.6 , pp. 107-15
    • Klein, G.1    Andronick, J.2    Elphinstone, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.