Towards Secure and Leak-Free Workflows Using Microservice Isolation

12/11/2020
by   Loïc Miller, et al.
0

Data leaks and breaches are on the rise. They result in huge losses of money for businesses like the movie industry, as well as a loss of user privacy for businesses dealing with user data like the pharmaceutical industry. Preventing data exposures is challenging, because the causes for such events are various, ranging from hacking to misconfigured databases. Alongside the surge in data exposures, the recent rise of microservices as a paradigm brings the need to not only secure traffic at the border of the network, but also internally, pressing the adoption of new security models such as zero-trust to secure business processes. Business processes can be modeled as workflows, where the owner of the data at risk interacts with contractors to realize a sequence of tasks on this data. In this paper, we show how those workflows can be enforced while preventing data exposure. Following the principles of zero-trust, we develop an infrastructure using the isolation provided by a microservice architecture, to enforce owner policy. We show that our infrastructure is resilient to the set of attacks considered in our security model. We implement a simple, yet realistic, workflow with our infrastructure in a publicly available proof of concept. We then verify that the specified policy is correctly enforced by testing the deployment for policy violations, and estimate the overhead cost of authorization.

READ FULL TEXT

page 28

page 29

research
06/03/2020

A Distributed Trust Framework for Privacy-Preserving Machine Learning

When training a machine learning model, it is standard procedure for the...
research
08/07/2022

An Enclave-based TEE for SE-in-SoC in RISC-V Industry

Secure Element (SE) in SoC sees an increasing adoption in industry. Many...
research
02/08/2023

Parma: Confidential Containers via Attested Execution Policies

Container-based technologies empower cloud tenants to develop highly por...
research
06/26/2023

Citadel: Enclaves with Strong Microarchitectural Isolation and Secure Shared Memory on a Speculative Out-of-Order Processor

We present Citadel, to our knowledge, the first enclave platform with st...
research
08/10/2021

Decentralised Trust for the Digital Economy

We propose a research initiative to explore and evaluate end-user techno...
research
03/03/2022

5G Network Slice Isolation

This article reveals an adequate comprehension of basic defense, securit...
research
11/03/2020

Model of Trust Management for Digital Industry Services. Towards E-Commerce 4.0

The progressive digitalization is changing the way businesses work and i...

Please sign up or login with your details

Forgot password? Click here to reset