skip to main content
10.1145/3147234.3148102acmconferencesArticle/Chapter ViewAbstractPublication PagesuccConference Proceedingsconference-collections
research-article

Mechanisms for Mutual Attested Microservice Communication

Published: 05 December 2017 Publication History

Abstract

For systems composed of many rapidly-deployed microservices that cross networks and span trust domains, strong authentication between microservices is a prerequisite for overall system trustworthiness. We examine standard authentication mechanisms in this context, and we introduce new comprehensive, automated, and fine-grained mutual authentication mechanisms that rely on attestation, with particular attention to provisioning and managing secrets. Prototype implementations and benchmark results indicate that mutual attestation introduces only modest overheads and can be made to meet or exceed the performance of common but weaker authentication mechanisms in many scenarios.

References

[1]
Frederik Armknecht, Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Gianluca Ramunno, and Davide Vernizzi. 2008. An Efficient Implementation of Trusted Channels Based on OpenSSL. In Proc. ACM Workshop Scalable Trusted Comput.
[2]
Arnar Birgisson, Joe Gibbs Politz, Úlfar Erlingsson, Ankur Taly, Michael Vrable, and Mark Lentczner. 2014. Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud. In Proc. Annu. Netw. and Distrib. Syst. Security Symp.
[3]
George Coker, Joshua Guttman, Peter Loscocco, Amy Herzog, Jonathan Millen, Hanlon O'Brian, John Ramsdell, Ariel Segall, Justin Sheehy, and Brian Sniffen. 2011. Principles of Remote Attestation. International Journal of Information Security 10, 2 (2011), 63--81.
[4]
Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram Khalili. 2005. A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Trans. Inf. and Syst. Security 8, 2 (2005), 228--258.
[5]
Zakir Durumeric, James Kasten, Michael Bailey, and J. Alex Halderman. 2013. Analysis of the HTTPS Certificate Ecosystem. In Proc. Internet Measurement Conf.
[6]
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, and N. Asokan. 2007. Beyond secure channels. In Proc. ACM Workshop Scalable Trusted Comput.
[7]
Kenneth Goldman, Ronald Perez, and Reiner Sailer. 2006. Linking remote attestation to secure tunnel endpoints. In Proc. ACM Workshop Secure Web Services.
[8]
Urs Hölzle. 2017. Bolstering security across Google Cloud. https://www.blog. google/topics/google-cloud/bolstering-security-across-google-cloud/. (March 2017).
[9]
Istio 2017. https://istio.io/. (June 2017).
[10]
Hongqian Karen Lu. 2014. Keeping Your API Keys in a Safe. In Proc. IEEE Int. Conf. Cloud Comput.
[11]
John Manferdelli, Tom Roeder, and Fred Schneider. 2013. The CloudProxy Tao for Trusted Computing. Technical Report UCB/EECS-2013-135. University of Califronia at Berkeley.
[12]
Jisoo Oh, Jaemin Park, Sungjin Park, and Jong-JinWon. 2016. TAaaS: Trustworthy Authentication as a Service. In Proc. IEEE Int. Conf. Cloud Comput.
[13]
Steven B. Roosa and Stephen Schultze. 2013. Trust Darknet: Control and Compromise in the Internet's Certificate Authority Model. IEEE Internet Comput. 17, 3 (Feb. 2013), 18--25.
[14]
Nabil Schear, Patrick T. Cable II, Thomas M. Moyer, Bryan Richard, and Robert Rudd. 2016. Bootstrapping and Maintaining Trust in the Cloud. In Proc. Annu. Comput. Security Appl. Conf.
[15]
Frederic Stumpf. 2010. Leveraging attestation techniques for trust establishment in distributed systems. Ph.D. Dissertation. Technische Universität Darmstadt.
[16]
Trusted Computing Group. 2011. Trusted Platform Module (TPM) Specification, version 1.2. https://www.trustedcomputinggroup.org/specs/TPM/. (1 March 2011).
[17]
Kevin Walsh. 2016. TLS with Trustworthy Certificate Authorities. In Proc. IEEE Conf. Commun. and Netw. Security.
[18]
Kevin Walsh and John Manferdelli. 2017. Intra-Cloud and Inter-Cloud Authentication. In Proc. IEEE Int. Conf. Cloud Comput.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
UCC '17 Companion: Companion Proceedings of the10th International Conference on Utility and Cloud Computing
December 2017
252 pages
ISBN:9781450351959
DOI:10.1145/3147234
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 December 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. attestation
  2. mutual authentication
  3. trustworthy computing

Qualifiers

  • Research-article

Conference

UCC '17
Sponsor:

Acceptance Rates

Overall Acceptance Rate 38 of 125 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Research on legacy monolith applications decomposition into microservice architectureundefined10.20334/2024-018-MOnline publication date: 2024
  • (2023)An Overview Analysis of Authentication Mechanism in Microservices-Based Software Architecture: A Discussion Paper2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)10.1109/ICSECS58457.2023.10256409(1-6)Online publication date: 25-Aug-2023
  • (2023)SoKComputers and Security10.1016/j.cose.2023.103119127:COnline publication date: 1-Apr-2023
  • (2023)TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution EnvironmentsInformation Security10.1007/978-3-031-49187-0_13(246-264)Online publication date: 15-Nov-2023
  • (2021)Trusted Sockets Layer: A TLS 1.3 Based Trusted Channel ProtocolSecure IT Systems10.1007/978-3-030-91625-1_10(175-191)Online publication date: 13-Nov-2021
  • (2020)MSChain: Blockchain based Decentralized Certificate Transparency for Microservices2020 Moratuwa Engineering Research Conference (MERCon)10.1109/MERCon50084.2020.9185320(1-6)Online publication date: Jul-2020
  • (2019)Recent trends in applying TPM to cloud computingSECURITY AND PRIVACY10.1002/spy2.933:1Online publication date: 28-Nov-2019
  • (2019)Straddling the crevasse: A review of microservice software architecture foundations and recent advancementsSoftware: Practice and Experience10.1002/spe.272949:10(1448-1484)Online publication date: 19-Jul-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media