Figure 3: Tree of the concerned vulnerabilities in this ex-
ample.
apply Equation 2 to quantify the security of the en-
tire infrastructure. Table 3 summarizes all the results
we acquired in this experiment. The resulting value,
0.6304, is particularly medium-to-high when we re-
fer to our qualitative classification in Table 1. This
means that the administrator of the system has to take
rapid actions to patch the vulnerabilities, particularly
if the reasons for not updating the system are mission
or cost factors.
5 CONCLUSIONS
We introduced a unique approach for quantifying se-
curity in Infrastructure as a Service cloud computing.
We developed our approach basing on industry and
consumer needs and evaluated its applicability with
the example described in section 5. Currently, many
administrators of cloud systems use the CVSS to eval-
uate potential reported vulnerabilities, with the result-
ing score helping to quantify the severity of the vul-
nerability and to prioritize their response. The differ-
ence is that they do it with single isolated vulnerabil-
ities, they do not have a response in case of mixed
combined vulnerabilities. By contrast, our proposal
is a response in such particular cases. We do not ar-
gue that our proposal is the ultimate security solution
that will solve all the security problems in IaaS cloud
systems. Our method allows quantifying security in
IaaS environment when vulnaribilities are discovered
Table 2: Discovered vulnerabilities and their exploitability
values.
Components Vulnerabilities Renaming Q (Exploitability)
Xen 4.1
CVE-2011-1898 V
X1
0.44
CVE-2011-1583 V
X2
0.34
VM
1
(Apache 2.0)
CVE-2011-3192 V
11
1
CVE-2011-4317 V
12
0.86
CVE-2011-4415 V
13
0.19
VM
2
(MySQL) CVE-2010-1626 V
21
0.39
VM
7
(Bind 9.8.0)
CVE-2011-2465 V
71
0.49
CVE-2011-2464 V
72
1
Table 3: Summary of the results.
Components Partial Quantification
Q[Xen 4.1] 0.6304
Q[VM
1
] 1
Q[VM
7
] 1
Q[IaaS] 0.6304
in the system. In the case of unavailability of vulnari-
bilities, our proposal becomes inept. After the evalua-
tion of the security level of a system, the latter still re-
mains subject to successful attacks until the cloud ad-
ministrator takes necessary measures. Therefore, our
proposal does not technically prevent attacks. Fur-
thermore, it is obvious that our method does not work
for zero-day-attacks as the attacker exploits new vul-
nerabilities that are not referenced yet in any vulnera-
bility databases.
REFERENCES
Enisa cloud computing risk assessment. http://
www.enisa.europa.eu/act/rm/files/deliverables/cloud-
computing- risk-assessment.
chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Ma-
suoka, R., and Molina, J. (2009). Controlling data
in the cloud: Outsourcing computation without out-
sourcing control. In Cloud Computing Security Work-
shop. ACM Press.
Mell, P., Scarfone, K., and Romanosky, S. (2007).
A complete guide to the common vulnerabil-
ity scoring system version 2.0. In FIRST.
http://www.first.org/cvss/cvss-guide.html.
Pearson, S. and Benameur, A. (2009). Privacy, security and
trust issues arising from cloud computing. In 2nd in-
ternational conference on cloud computing technol-
ogy and science. IEEE.
Ristenpart, T., Tromer, E., Shacham, H., and Savage, S.
(2009). Hey you get out off my cloud: Exploring in-
formation leakage in third party compute clouds. In
CCS09. ACM.
Takabi, H., Joshi, J. B. D., and Ahn, G.-J. (2010). Secu-
rity and privacy challenges in cloud environments. In
Security and Privacy. IEEE.
Vaquero, L. M., Merino, L. R., and Moran, D. (2011). Lock-
ing the sky: a survey on iaas cloud security. In In Jour-
nal Computing - Cloud Computing Volume 91 Issue 1.
Springer-Verlag.
Zhou, M., Zhang, R., Xie, W., Qiang, W., and A.Zhou
(2010). Security and privacy in cloud computing: A
survey. In 6th International Conference on semantics,
Knowledge and grids.
CLOSER2013-3rdInternationalConferenceonCloudComputingandServicesScience
148