Download presentation
Presentation is loading. Please wait.
Published byAldous Sharp Modified over 8 years ago
1
Forward: Preventing XML Signature Wrapping Attacks in Cloud Computing Prepared by: Abdulaziz AlShammari Professor Ramasamy Uthurusamy April10, 2014
2
2 Agenda What is Cloud Computing? Layers of Cloud Computing. Why Cloud? Related Work Technical Security Issues in Cloud Computing. What are the problems? Proposed Solutions Conclusion References Alshammari/Cloud Security
3
3 It is a new paradigm for the provision of computing services. Shifting the location of these services to the network causes reducing the costs of hardware and software resources. What is Cloud Computing? Alshammari/Cloud Security
4
4 Models of Cloud Computing Alshammari/Cloud Security
5
5 Models of Cloud Computing Alshammari/Cloud Security
6
6 To reduce the costs: (Pay – As – You – Go) 1- To reduce hardware costs (IaaS). 2- To reduce software license costs (SaaS), (PaaS). To support the Scalable Systems: - To NOT worry about increasing of users and requests. On-demand service Broad Network Access Why we use Cloud Computing? Alshammari/Cloud Security
7
7 1- Web-Services: Provide access to (IaaS) 2- Web-Browsers: Provide access to (SaaS) * Both provide the access to (PaaS) Two main technologies are used to access these three Cloud services Alshammari/Cloud Security
8
Related work McIntosh and Austel: A signature must be present in the security header The element specified by /soap:Envelope/ soap:Body must be referenced from the signature The element matching /soap:Envelope/soap:Header/ wsse:Security/wsu:Timestamp must be referenced from the signature the signature verification key must be provided by an X.509 certificate issued by a trusted CA Alshammari/Cloud Security 8
9
Related work Gruschka and Lo Iacono : XSW attack that the proposed checks by McIntosh and Austel are not sufficient to effectively detect XSW attacks Bhargavan, Fournet and Gordon Mandatory elements: wsa:To, wsa:Action, soap:Body Signed elements: all mandatory, wsa:MessageID, wsu:Timestamp Recommended: use of X.509 certificates for authentication Alshammari/Cloud Security 9
10
10 Cloud Security issues focuse on: 1- Confidentiality. 2- Integrity. 3- Authentication. Two places that must be secure in Cloud which are: 1- Web-Services (WS). 2- Web-Browser (WB). Some Technical Security Issues in Cloud Computing Alshammari/Cloud Security
11
11 WS-Security: it is a mechanism for web service working in message level. How to provide Confidentiality, Integrity, and Authentication for messages? 1- By using XML signature: For XML fragments to be digitally signed to ensure integrity and authentication. 2- By using XML Encryption: For XML fragments to be encrypted to ensure data confidentiality. 1- Web-Service Security Alshammari/Cloud Security
12
12 Also works with: 1- XML Signature. 2- XML Encryption. Modern Web-Browser are using AJAX techniques (Asynchronous Java Scripts and XML) to develop platform independent I/O tools. New names for that techniques (Web Applications, Web 2.0, or SaaS). 2- Web-Browser Security Alshammari/Cloud Security
13
13 XML Signature Element Wrapping: SOAP messages are generally transmitted through HTTP protocol with an XML format. Attacker is able to manipulate a SOAP messages by copying the target element and inserting another value and moving the original element to somewhere on the SOAP message. What is the problem with Web-Services? What is the problem with Web-Services? To Solve The Problem: Using a combination of WS-Security with XML signature to sign particular element and digital certificated such as X.509. Create a list of elements that is used in the system, and reject any other messages. XSpRES to ensures that the digital signatures are generated and verified by combining a hardened XML signature library Alshammari/Cloud Security
14
14 Second Part “What are the problems?” Alshammari/Cloud Security
15
15 XML Signature Element Wrapping: SOAP messages are generally transmitted through HTTP protocol with an XML format. Attacker is able to manipulate a SOAP messages by copying the target element and inserting another value and moving the original element to somewhere on the SOAP message. What is the problem with Web-Services? What is the problem with Web-Services? Alshammari/Cloud Security
16
16 What is the problem with Web-Services? What is the problem with Web-Services? Alshammari/Cloud Security XML Signature Element Wrapping:
17
17 What is the problem with Web-Services? What is the problem with Web-Services? Alshammari/Cloud Security
18
18 The web-Browsers are not able to apply WS-Security concepts (XML signature and XML encryption). BECAUSE: 1- Data can only be encrypted through (TLS) which is Transport Layer Security. 2- XML signatures are only used within the (TLS) handshake. What is the problem with Web-Browser? Alshammari/Cloud Security
19
19 1- For the problems in Web-Browsers / SSL Create new web browsers that apply WS-Security concepts. The WS-Security works in message level, so it appears to be more suitable than SSL/TLS. Then, these web browsers are able to use XML Encryption in order to provide end-to-end encryption in SOAP messages. Opportunities for Advancement Alshammari/Cloud Security
20
Proposed Solutions o Companies should adhere to guidelines stipulated by Open Web Application Security Project (OWASP) that emphasis on designing secure web application and services. o Companies need to integrate the guidelines in their System development life cycle. This will ensure web services like cloud computing will follow the necessary steps and ensure minimal vulnerabilities. Alshammari/Cloud Security 20
21
Proposed Solutions o I would suggest use of other protocols like use of Representational State Transfer (REST) instead of SOAP. o REST provides encryption of data using many formats unlike SOAP that offers only use of XML. Alshammari/Cloud Security 21
22
Proposed Solutions Alshammari/Cloud Security 22 Find strong method to protect this part
23
23 1. Cloud Computing: 1. WS 2. WB 2. WS-Security Mechanism: XML Signature. XML Encryption. 3. Technical security : XML Signature Wrapping Attacks. 4. Future Work Conclusion Alshammari/Cloud Security
24
References Constantin, L. (2011). Researchers demo cloud security issue with Amazon AWS attack. Computerworld. Retrieved 29 March 2015, from http://www.computerworld.com/article/2499567/network-security/researchers-demo-cloud- security-issue-with-amazon-aws-attack.html http://www.computerworld.com/article/2499567/network-security/researchers-demo-cloud- security-issue-with-amazon-aws-attack.html Kouchaksaraei, H., & Chefranov, A. (2013). Countering Wrapping Attack on XML Signature in SOAP Message for Cloud Computing. Arxiv.org. Retrieved 29 March 2015, from http://arxiv.org/abs/1310.0441 http://arxiv.org/abs/1310.0441 Mainka, C., Jensen, M., Lo Iacono, L., & Schwenk, J. (2013). Making XML Signatures Immune to XML Signature Wrapping Attacks. Cloud Computing And Services Science, 151-167. doi:10.1007/978-3-319-04519-1_10 McIntosh, M., & Austel, P. (2014). XML Signature Element Wrapping Attacks and Countermeasures (1st ed.). Retrieved from http://domino.research.ibm.com/library/cyberdig.nsf/papers/73053F26BFE5D1D385257067004CF D80/$File/rc23691.pdf http://domino.research.ibm.com/library/cyberdig.nsf/papers/73053F26BFE5D1D385257067004CF D80/$File/rc23691.pdf Muralidhara, P. (2013). Security issues in cloud computing and its countermeasures (1st ed.). Retrieved from http://www.ijser.org/researchpaper%5CSecurity-issues-in-cloud-computing-and- its-countermeasures.pdfhttp://www.ijser.org/researchpaper%5CSecurity-issues-in-cloud-computing-and- its-countermeasures.pdf Alshammari/Cloud Security 24
25
References Constantin, L. (2011). Researchers demo cloud security issue with Amazon AWS attack. Computerworld. Retrieved 29 March 2015, from http://www.computerworld.com/article/2499567/network-security/researchers-demo-cloud- security-issue-with-amazon-aws-attack.html http://www.computerworld.com/article/2499567/network-security/researchers-demo-cloud- security-issue-with-amazon-aws-attack.html Jensen M and Schwenk J (2009). On Technical Security Issues in Cloud Computing. Horst Gortz Institute for IT Security, Ruhr University Bochum, Germany. Alshammari/Cloud Security 25
26
Alshammari/Cloud Security 26 Thank you
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.