can potentially provide hierarchical authentication au-
thorization capabilities to the CTA as illustrated by Yi
& Wang (Yi and Wang, 2012). In the scenario of an
information leak, Merkle trees would allow adminis-
trators to black list either a single or a hierarchy of
hash chains to safeguard the system.
7 RELATED WORK
There have been other systems proposed which offer
moving target defence using a temporary address or
a temporary authentication mechanism. Many tech-
nology companies have real world implementations
of the Central Trusted Authority architecture similar
to our proposal. In this section we present the most
relevant proposals and discuss how our proposed ar-
chitecture differs.
Dunlop et al (Dunlop et al., 2011) leverage the
vast address space (2
128
) of IPv6 to move the source
and destination IP addresses mid-session based on a
pre-agreed pattern to limit an attacker’s ability to in-
tercept or interfere with a TCP session. The technique
proposed by Kampanakis (Kampanakis et al., 2014),
however, operates at the network level by using an
SDN’s ability to vary the address space and the route
taken by packets to increase the cost for an attacker
and thus providing moving target defence.
Active authentication proposed by (Yiu et al.,
2011; Aksari and Artuner, 2009; Li et al., 2014) of-
fer a way to verify a user’s identity based on their
behaviour thus eliminating the need for hard to re-
member passwords. Active authentication is a form of
moving target defence where the authenticating fac-
tor is constantly changing in a hard to predict manner,
thus significantly increasing the cost for an attacker to
reproduce the authenticating factor.
Confidant (lyft, 2015) is a library maintained by
Lyft, a transportation network company based out of
San Francisco. Confidant provides an implementa-
tion of the Central trusted authority server. This sys-
tem lacks the hash chain based approach that we use
and as a result does not provide the additional mov-
ing target defence that raises the adversary’s cost of
launching an attack.
8 CONCLUSION
In this paper we propose an architecture which in-
creases the cost of exploiting vulnerabilities for an
attacker with minimal impact on performance by pro-
viding moving target defence using a pool of Client
Facing Servers (CFS) which only operate for a rela-
tively short period of time. Our architecture also sig-
nificantly hampers an attacker’s ability to steal sen-
sitive configuration information from by centralizing
configuration within a Central Trusted Authority.
We believe this approach can be used in cloud sys-
tems to limit the risk of a compromised client facing
server. Security-related software bugs are constantly
being discovered and exploited, so while we may not
be able to deploy a system that will never be compro-
mised, we can deploy defences that limit the effec-
tiveness of an attacker, even when they are utilizing a
zero-day attack.
ACKNOWLEDGEMENTS
The work presented in this paper was partially sup-
ported under US National Science Foundation Grant
DGE-1419313. The author would like to thank Vic-
toria Wettmarshausen from UW Bothell’s Writing &
Communication Center for her feedback on the struc-
ture and presentation of this paper.
REFERENCES
Aksari, Y. and Artuner, H. (2009). Active authentication
by mouse movements. In Computer and Information
Sciences, 2009. ISCIS 2009. 24th International Sym-
posium on, pages 571–574. IEEE.
Basiri, A., Behnam, N., Rooij, R. d., Hochstein, L.,
Kosewski, L., Reynolds, J., and Rosenthal, C. (2016).
Chaos Engineering. IEEE Software, 33(3):35–41.
Bilge, L. and Dumitras, T. (2012). Before we knew it: an
empirical study of zero-day attacks in the real world.
In Proceedings of the 2012 ACM conference on Com-
puter and communications security, pages 833–844.
ACM.
Chalkias, K. and Stephanides, G. (2006). Timed re-
lease cryptography from bilinear pairings using hash
chains. In Communications and Multimedia Security,
pages 130–140. Springer.
Chen, R., Reznichenko, A., Francis, P., and Gehrke, J.
(2012). Towards statistical queries over distributed
private user data. In Presented as part of the 9th
USENIX Symposium on Networked Systems Design
and Implementation (NSDI 12), pages 169–182.
Dunlop, M., Groat, S., Urbanski, W., Marchany, R., and
Tront, J. (2011). MT6d: A Moving Target IPv6 De-
fense. In 2011 - MILCOM 2011 Military Communi-
cations Conference, pages 1321–1326.
Evans, D., Nguyen-Tuong, A., and Knight, J. (2011). Ef-
fectiveness of Moving Target Defenses. In Jajodia, S.,
Ghosh, A. K., Swarup, V., Wang, C., and Wang, X. S.,
editors, Moving Target Defense, number 54 in Ad-
vances in Information Security, pages 29–48. Springer
New York. DOI: 10.1007/978-1-4614-0977-9 2.
Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers
453