Attack tree analysis of Man in the Cloud attacks on client device synchronization in cloud computing

Aaron Zimba, Chen Hongsong, Wang Zhao-shun
{"title":"Attack tree analysis of Man in the Cloud attacks on client device synchronization in cloud computing","authors":"Aaron Zimba, Chen Hongsong, Wang Zhao-shun","doi":"10.1109/COMPCOMM.2016.7925189","DOIUrl":null,"url":null,"abstract":"Cloud computing has many irrefutable advantages and one of the most attractive benefits thereof that is seeing users migrate to the cloud is the ability to synchronize each of their devices with the cloud. A user can be in a different locality with a different device altogether but with the advent of cloud synchronization, he is able to access and replicate data changes to all of his synchronized devices. However, this convenience comes at a cost. The framework that is implemented to actualize this adorable functionality leaves much to be desired in that authorization to synchronize with the cloud only requires a synchronization token offered to the user upon his one-time authentication. This entails that whoever presents this synchronization token is able to synchronize with the user's data both locally and on the cloud without the need to provide any login credentials. The task of the attacker therefore is to acquire this synchronization token which is always stored locally on the cloud user's device and this task is actualized via a Man in the Cloud (MITC) attack. This paper employs attack trees to analyze the constituents of a MITC attack process in the synchronization of client devices in cloud computing. We further propose from the analysis, areas of concentration when deploying preventative measures.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPCOMM.2016.7925189","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Cloud computing has many irrefutable advantages and one of the most attractive benefits thereof that is seeing users migrate to the cloud is the ability to synchronize each of their devices with the cloud. A user can be in a different locality with a different device altogether but with the advent of cloud synchronization, he is able to access and replicate data changes to all of his synchronized devices. However, this convenience comes at a cost. The framework that is implemented to actualize this adorable functionality leaves much to be desired in that authorization to synchronize with the cloud only requires a synchronization token offered to the user upon his one-time authentication. This entails that whoever presents this synchronization token is able to synchronize with the user's data both locally and on the cloud without the need to provide any login credentials. The task of the attacker therefore is to acquire this synchronization token which is always stored locally on the cloud user's device and this task is actualized via a Man in the Cloud (MITC) attack. This paper employs attack trees to analyze the constituents of a MITC attack process in the synchronization of client devices in cloud computing. We further propose from the analysis, areas of concentration when deploying preventative measures.
云计算中Man in the Cloud攻击客户端设备同步的攻击树分析
云计算有许多无可辩驳的优点,其中最吸引人的优点之一就是看到用户迁移到云,能够将他们的每个设备与云同步。用户可以在不同的位置使用不同的设备,但是随着云同步的出现,他可以访问数据更改并将其复制到所有同步设备中。然而,这种便利是有代价的。为实现这个可爱的功能而实现的框架还有很多需要改进的地方,因为与云同步的授权只需要在用户进行一次性身份验证时提供一个同步令牌。这就要求提供此同步令牌的人能够在本地和云上同步用户的数据,而无需提供任何登录凭据。因此,攻击者的任务是获取此同步令牌,该令牌始终存储在本地云用户的设备上,并且该任务通过云中的人(MITC)攻击实现。本文采用攻击树分析了云计算客户端设备同步过程中MITC攻击过程的组成。我们进一步从分析中提出了部署预防措施时的重点领域。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信