Therefore, capabilities enabled by the underlying
cloud platform seamlessly adds high visibility on sys-
tem’s runtime to prevent disruptive faulty behavior.
The preliminary result show the feasibility of the un-
precedented security capabilities enabled by underly-
ing computing fabric to defend against unknown ene-
mies.
5 RELATED WORK
There has been a wide array of research on tack-
ling the reliability of pub/sub systems at the appli-
cation layer. (Mayer, 2011), discussed over decades
of works on replication techniques and a taxonomy
of Byzantine faults in pub/sub systems considering
failure scenarios, however, all these studies address
reachability issues, i,e, link/node crashes and fast re-
covery in the overlay brokers.
Recent protocol level solution approaches include
the crash tolerant Paxos-based proposed by (Chang,
2014), the State Machine consensus replication model
presented in (Jehl, 2013), and the overlay network
based on neighbourhoods (Kazemzadeh, 2013).
All of these solutions address BFT-resiliency in
the context of pub/sub by modifying the pub/sub mes-
saging protocol. In contrast, our generic solution ap-
proach can be applied to any pub/sub system, perhaps,
non-pub/sub replicated systems to resist BFT-faults
without any modification to the protocol while con-
sidering the underlying computing fabric.
6 CONCLUSIONS
We showed the capabilities enabled by the underlying
computing fabric are simpler and effective than the
ones implemented in the protocol to defend against
modern sophisticated attacks. The practicality and
the effectiveness of the proposed scheme is illustrated
with a widely adopted open source cloud manage-
ment software stack (OpenStack) and replicated pub-
lish and subscribe (RabitMQ) system deployed on a
realistic private cloud setting.
Future works will address remote hardware and
software attestation, and trace-based performance
analysis of VM refreshes across multiple cloud
providers. We will consider integrating Virtual Ma-
chine Introspection for fine tuning the VM refresh rate
while injecting/detecting attacks to determine the lim-
its impose by the cloud platforms for an acceptable
exposure window.
ACKNOWLEDGEMENTS
Authors would like to sincerely thank Jim Hanna for
the cloud platform support and Matthew Paulini for
his editorial proofing contributions, both at AFRL/RI.
Special thanks for the anonymous reviewers for their
feedback.
REFERENCES
Ahmed, N., and Bhargava, B. 2015. Towards Targeted In-
trusion Detection Deployments in Cloud Computing.
In the Int. Journal of Next-Generation Computing Vol.
6, No 2 (2015), IJNGC - JULY 2015.
Chang, T., and Meling, H., 2012. Byzantine Fault-Tolerant
Publish/Subscribe: A Cloud Computing Infrastructure
In the Proceedings of the Symposium on Reliable and
Distributed Systems. October 2012.
Chang, T., Duan, S., Meling, H., Peisert, S., and Zhang, H.,
2014. P2S: A Fault-Tolerant Publish/Subscribe Infras-
tructure In the Proceedings of DEBS, May 2014
Eugster, P., Felber, P., Guerraoui, R., and Kermarrec, M.,
2003. The Many Faces of Publish/Subscribe. In the
Proceedings of the ACM CSUR 35, 2 (June 2003).
Jehl, L. ,and Meling, H., 2013. Towards Byzantine Fault To-
letant Publish/Subscribe: A State Machine Approach
In the Proceedings of HotDep, November 2013
Kazemzadeh, S. R., and Jacobsen, H., 2013. PubliyPrime:
Exploiting Overly Neighbourhood to Defeat Byzan-
tine Publish/Subscribe Brokers. TR University of
Toronto, May 2013
Kazemzadeh, S. R., and Jacobsen, H., 2009. Reliable
and Highly Available Publish and Subscribe In the
Proceedings of the Symposium on Reliable and Dis-
tributed Systems. October 2009.
Lamport, L., Shostak, R., and Pease, M. 1982. The Byzan-
tine Generals Problem. In ACM Trans. Program.
Lang. Syst., 4(3): 382–401, 1982.
Manadhata, P.K., and, Wing, J.M., (2011). An Attack Sur-
face Metric In the IEEE Trans. Software Engineering,
37, 371-386, 2011.
Mayer, R. T., Brunie, L., Coquil, D., and Kosh, H. 2011.
Evaluating the Robustness of Publish and Subscribe
Systems. In the Proceedings of IEEE Int. Conf. of
(3PGCIC). pp. 75-82. 2011.
OpenStack(2015). https://www.openstack.org/
RabitMQ (2015). https://www.rabbitmq.com/ha.html
RackSpace,(2015). https://www.rackSpace.com/
Schneider, F., 1990. Implementing Fault-Tolerant Services
using the State Machine Approach: A tutorial. In
ACM Computing Surveys (CSUR) 22.4 (1990): 299-
319.
CLOSER 2016 - 6th International Conference on Cloud Computing and Services Science
220