Skip to main content

Formal Analysis of Dynamic Domain Establishment Protocol in Cloud Logging Service

  • Conference paper
Dependable Computing (EWDC 2013)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 7869))

Included in the following conference series:

  • 1022 Accesses

Abstract

We present a formal analysis of the dynamic domain establishment protocol in the Cloud logging service. The protocol is used to establish a trust channel between the log as a service client agent (LCA) and the log as a service server agent (LSA). Formal specification and verification have been carried out using the specification language HLPSL and AVISPA, a state-of-the-art verification tool for security protocols. AVISPA has revealed two main security flaws, one of which (previously unheard of, up to our knowledge) allows an intruder to impersonate the LCA to join the dynamic domain, and may launch a denial-of-service attack. To address this problem, we propose to use explicit identity information in one’s signature. The other one is the information leakage problem, to solve this problem we propose a modification of the protocol by adding a key update protocol. After these modifications, this protocol has been verified with AVISPA to be safe from these two attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Armbrust, M., Fox, A., Joseph, A.D., Katz, R., et al.: A view of Cloud computing. Communications of the ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  2. Huh, J.H., Martin, A.: Trusted logging for grid computing. In: Third Asia-Pacific Trusted Infrastructure Technologies Conference, pp. 30–42. IEEE Computer Society (2008)

    Google Scholar 

  3. Abbadi, I.M., Alawneh, M.: A framework for establishing trust in the Cloud. Computers and Electrical Engineering 38, 1073–1087 (2012)

    Article  Google Scholar 

  4. Abbadi, I.M., Martin, A.: Trust in Cloud. Information Security Technical Report 16, 108–114 (2011)

    Article  Google Scholar 

  5. Abbadi, I.M.: A framework for establishing trust in Cloud provenance. International Journal of Information Security 12(2), 111–128 (2013)

    Article  Google Scholar 

  6. Abbadi, I.M.: Clouds’ infrastructure taxonomy, properties, and management services. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) ACC 2011, Part IV. CCIS, vol. 193, pp. 406–420. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  7. Hussein, M., Seret, D.: A comparative Study of Security Protocols Validation Tools: HERMES vs AVISPA. In: Proceedings of IEEE International Conference on Advanced Communication Technology, ICACT 2006, pp. 497–502. IEEE Computer Society (2006)

    Google Scholar 

  8. Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., et al.: A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols. In: Proc. SAPS 2004, pp. 281–285. Austrian Computer Society (2004)

    Google Scholar 

  9. Sun, S.T., Hawkey, K., Beznosov, K.: Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures. Computers & Security 31(4), 465–483 (2012)

    Article  Google Scholar 

  10. Parno, B.J.: Trust extension as a mechanism for secure code execution on commodity computers. Thesis for the Ph. D. Degree, School of Electrical and Computer Engineering Carnegie Mellon University, pp. 62–70 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hu, W., Ji, D. (2013). Formal Analysis of Dynamic Domain Establishment Protocol in Cloud Logging Service. In: Vieira, M., Cunha, J.C. (eds) Dependable Computing. EWDC 2013. Lecture Notes in Computer Science, vol 7869. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38789-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38789-0_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38788-3

  • Online ISBN: 978-3-642-38789-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics