Kernel-Based Container File Access Control Architecture to Protect Important Application Information
Abstract
:1. Introduction
- All container file-access events of users can be monitored in real time.
- The security environment of application services is strengthened by denying unauthorized access to container files.
- The proposed architecture has minimal effect or other services because only a few system resources are used to provide the access control function.
- The rapid enforcement of the access control function minimizes the performance degradation of the application service.
- The proposed architecture can serve as a security tool because it supports the identification of potentially malicious attackers and processes.
2. Related Works
2.1. LXC and Container Platforms
2.2. Security Threats and Requirements
2.3. Legacy File Access control Techniques
2.4. Limitations of the Legacy File Access control Techniques
3. Kernel-Based Container File Access control Architecture
3.1. Design Considerations
3.2. Access Control Policy Structure
3.3. Access Control Architecture for Container Files
- Preserve container features.
- Minimize changes in the container platform configuration.
- Use information known to users that can be easily used.
- Minimize resources required for providing the access control function.
4. Implementation on the Linux Platform
4.1. ConPolicy
4.2. Cont_Agt_D
4.3. Container File Access Control Kernel Driver
4.3.1. Kernel Policy Manager
4.3.2. File Access Control Handler
5. Verification of the Container File Access Control Architecture
5.1. Function Verification Items
5.2. Performance Verification
5.2.1. CPU Usage
5.2.2. Policy Enforcement Time
5.3. Verification Analysis
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Ferreira, A.P.; Sinnott, R. A performance evaluation of containers running on managed Kubernetes services. In Proceedings of the IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Bangkok, Thailand, 13–16 December 2019; pp. 199–208. [Google Scholar] [CrossRef]
- Casalicchio, E.; Iannucci, S. The state-of-the-art in container technologies: Application, orchestration and security. Concurr. Comput. Pract. Exper. 2020, 32, e5668. [Google Scholar] [CrossRef]
- Sabharwal, N.; Pandey, P. Container image management using Google container registry. In Pro Google Kubernetes Engine; Apress: Berkeley, CA, USA, 2020; pp. 65–96. [Google Scholar] [CrossRef]
- Koschmieder, L.; Hojda, S.; Apel, M.; Altenfeld, R.; Bami, Y.; Haase, C.; Lin, M.; Vuppala, A.; Hirt, G.; Schmitz, G.J. AixViPMaP®—An operational platform for microstructure modeling workflows. Integr. Mater. Manuf. Innov. 2019, 8, 122–143. [Google Scholar] [CrossRef]
- Becker, S.; Schmidt, F.; Kao, O. EdgePier: P2P-based container image distribution in edge computing environments. In Proceedings of the IEEE International Performance, Computing, and Communications Conference (IPCCC), Computing, Austin, TX, USA, 29–31 October 2021; pp. 1–8. [Google Scholar] [CrossRef]
- Ma, S.; Jiang, J.; Li, B.; Li, B. Maximizing container-based network isolation in parallel computing clusters. In Proceedings of the 24th International Conference on Network Protocols (ICNP), Singapore, 8–11 November 2016; pp. 1–10. [Google Scholar] [CrossRef]
- Mampage, A.; Karunasekera, S.; Buyya, R. Deadline-aware dynamic resource management in serverless computing environments. In Proceedings of the 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid), Melbourne, Australia, 10–13 May 2021; pp. 483–492. [Google Scholar] [CrossRef]
- Salhab, N.; Rahim, R.; Langar, R. NFV orchestration platform for 5G over on-the-fly provisioned infrastructure. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Paris, France, 29 April 2019; pp. 971–972. [Google Scholar] [CrossRef]
- Kim, B.S.; Lee, S.H.; Lee, Y.R.; Park, Y.H.; Jeong, J. Design and implementation of cloud docker application architecture based on machine learning in container management for smart manufacturing. Appl. Sci. 2022, 12, 6737. [Google Scholar] [CrossRef]
- Ngo, M.V.; Luo, T.; Hoang, H.T.; Ouek, T.Q.S. Coordinated container migration and base station handover in mobile edge computing. In Proceedings of the GLOBECOM IEEE Global Commun. Conference, Taipei, Taiwan, 7–11 December 2020; Volume 2020, pp. 1–6. [Google Scholar] [CrossRef]
- Huh, J.H. Implementation of lightweight intrusion detection model for security of smart green house and vertical farm. Int. J. Distrib. Sens. Netw. 2018, 14, 1550147718767630. [Google Scholar] [CrossRef] [Green Version]
- Wong, A.Y.; Chekole, E.G.; Ochoa, M.; Zhou, J. Threat Modeling and Security Analysis of Containers: A Survey. arXiv 2021, arXiv:2111.11475. [Google Scholar]
- Westfall, J. Basics of Linux security. In Set Up and Management Your Virtual Private Server; Apress: Berkeley, CA, USA, 2021; pp. 111–131. [Google Scholar] [CrossRef]
- Kim, D.K.; Ming, H.; Lu, L. Reflection on building hybrid access control by configuring RBAC and MAC features. In Proceedings of the 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER), London, ON, Canada, 18–21 February 2020; pp. 522–526. [Google Scholar] [CrossRef]
- Mullinix, S.P.; Konomi, E.; Townsend, R.D.; Parizi, R.M. On Security Measures for Containerized Applications Imaged with Docker. arXiv 2020, arXiv:2008.04814. [Google Scholar]
- Kaiser, S.; Haq, M.S.; Tosun, A.S.; Korkmaz, T. Container technologies for ARM architecture: A comprehensive survey of the state-of-the-art. IEEE Access. 2022, 10, 84853–84881. [Google Scholar] [CrossRef]
- Han, S.H.; Lee, H.K.; Lee, S.T.; Kim, S.J.; Jang, W.J. Container image access control architecture to protect applications. IEEE Access 2020, 8, 162012–162021. [Google Scholar] [CrossRef]
- Setiadi, D.R.I.M. PSNR vs SSIM: Imperceptibility quality assessment for image steganography. Multimed. Tools Appl. 2021, 80, 8423–8444. [Google Scholar] [CrossRef]
- Ge, Y.; Ding, Z.; Tang, M.; Tian, Y.C. Resource provisioning for mapreduce computation in cloud container environment. In Proceedings of the 18th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 26–28 September 2019; pp. 1–4. [Google Scholar] [CrossRef]
- Kelley, R.; Antu, A.D.; Kumar, A.; Xie, B. Choosing the right compute resources in the cloud: An analysis of the compute services offered by Amazon, Microsoft and Google. In Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Chongqing, China, 29–30 October 2020; pp. 214–223. [Google Scholar] [CrossRef]
- Sokolowski, D.; Weisenburger, P.; Salvaneschi, G. Automating serverless deployments for DevOps organizations. In Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on The Foundations of Software Engineering, Athens, Greece, 23–28 August 2021; pp. 57–69. [Google Scholar] [CrossRef]
- Buchanan, S.; Rangama, J.; Bellavance, N. Container registries. In Introducing Azure Kubernetes Service; Apress: Berkeley, CA, USA, 2020; pp. 17–34. [Google Scholar] [CrossRef]
- Aziz Shah, A.; Piro, G.; Alfredo Grieco, L.; Boggia, G. A quantitative cross-comparison of container networking technologies for virtualized service infrastructures in local computing environments. Trans. Emerg. Tel. Technol. 2021, 32, e4234. [Google Scholar] [CrossRef]
- Karn, R.R.; Kudva, P.; Huang, H.; Suneja, S.; Elfadel, I.M. Cryptomining detection in container clouds using system calls and explainable machine learning. IEEE Trans. Parallel Distrib. Syst. 2020, 32, 674–691. [Google Scholar] [CrossRef]
- Duan, J. Design and implementation of vulnerability attack and utilization platform based on container virtualization. In Proceedings of the 3rd International Acad. Exch. Conference on Science and Technology Innovation (IAECST), Guangzhou, China, 10–12 December 2021; pp. 368–372. [Google Scholar] [CrossRef]
- Sun, Y.; Lei, J.; Shin, S.; Lu, H. Baoverlay: A block-accessible overlay file system for fast and efficient container storage. In Proceedings of the 11th ACM Symposium on Cloud Computing, Virtual Event, 19–21 October 2020; pp. 90–104. [Google Scholar] [CrossRef]
- Hussein, M.K.; Mousa, M.H.; Alqarni, M.A. A placement architecture for a container as a service (CaaS) in a cloud environment. J. Cloud Comp. 2019, 8, 1–15. [Google Scholar] [CrossRef] [Green Version]
- Zhang, Y.; Fu, Y.; Li, G. Research on container throughput forecast based on Arima-BP neural network. J. Phys. Conf. Ser. 2020, 1634, 012024. [Google Scholar] [CrossRef]
- Kulkarni, S.G.; Liu, G.; Ramakrishnan, K.K.; Arumaithurai, M.; Wood, T.; Fu, X. Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, Heraklion, Greece, 4–7 December 2018; pp. 41–53. [Google Scholar] [CrossRef]
- Huh, J.H.; Seo, K. A case study of the base technology for the smart grid security: Focusing on a performance improvement of the basic algorithm for the DDoS attacks detection using Cuda. J. Korea Multimed. Soc. 2016, 19, 411–417. [Google Scholar] [CrossRef] [Green Version]
- Kim, S.K.; Kim, U.M.; Huh, J.H. A study on improvement of blockchain application to overcome vulnerability of IoT multiplatform security. Energies 2019, 12, 402. [Google Scholar] [CrossRef] [Green Version]
- Javed, O.; Toor, S. Understanding the Quality of Container Security Vulnerability Detection Tools. arXiv 2021, arXiv:2101.03844. [Google Scholar]
- Putra, G.D.; Dedeoglu, V.; Kanhere, S.S.; Jurdak, R. Trust management in decentralized iot access control system. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada, 4–7 May 2020; pp. 1–9. [Google Scholar] [CrossRef]
- Reeves, M.; Tian, D.J.; Bianchi, A.; Celik, Z.B. Towards improving container security by preventing runtime escapes. In Proceedings of the IEEE Sec. Dev. Conference (SecDev), Atlanta, GA, USA, 18–20 October 2021; pp. 38–46. [Google Scholar] [CrossRef]
- Lo Iacono, L.; Smith, M.; Zezschwitz, E.; Gorski, P.L.; Nehren, P. Consolidating principles and patterns for human-centred usable security research and development. In Proceedings of the European Workshop on Usable Security, London, UK, 24–26 April 2018. [Google Scholar] [CrossRef]
- Park, N.K.; An, Y. A study of rent fee assessment on the port railway station: The litigation case study of a Korean container terminal. J. Mar. Sci. Eng. 2022, 10, 1090. [Google Scholar] [CrossRef]
- Nam, S.M. A fuzzy rule-based system for automatically generating customized training scenarios in cyber security. J. Korea Soc. Comput. Inf. 2020, 25, 39–45. [Google Scholar] [CrossRef]
- Vyas, P.; Shyamasundar, R.K.; Patil, B.; Borse, S.; Sen, S. SP*: An information flow secure Linux. In Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York, NY, USA, 30 September 2021; pp. 1603–1612. [Google Scholar] [CrossRef]
- Han, S.H.; Lee, D. Kernel-based real-time file access monitoring structure for detecting malware activity. Electronics 2022, 11, 1871. [Google Scholar] [CrossRef]
- Cinque, M.; Cotroneo, D.; De Simone, L.; Rosiello, S. Virtualizing mixed-criticality systems: A survey on industrial trends and issues. Future Gener. Comput. Syst. 2022, 129, 315–330. [Google Scholar] [CrossRef]
- Rossi, M.; Facchinetti, D.; Bacis, E.; Rosa, M.; Paraboschi, S. {SEApp}: Bringing mandatory access control to Android apps. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), Virtual Event, 11–13 August 2021; pp. 3613–3630. [Google Scholar]
- Rothwell, W. Filesystem and process control. In Beginning Perl Programming; Apress: Berkeley, CA, USA, 2019; pp. 165–174. [Google Scholar] [CrossRef]
- Mathas, C.M.; Vassilakis, C.; Kolokotronis, N.; Zarakovitis, C.C.; Kourtis, M.A. On the design of IoT security: Analysis of software vulnerabilities for smart grids. Energies 2021, 14, 2818. [Google Scholar] [CrossRef]
- Kim, H.; Hahn, C.; Hur, J. Real-time detection of cache side-channel attack using non-cache hardware events. In Proceedings of the International Conference on Information Networking (ICOIN), Jeju Island, Republic of Korea, 13–16 January 2021; pp. 28–31. [Google Scholar] [CrossRef]
- Ko, J.Y.; Lee, S.G.; Lee, C.H. Real-time mandatory access control on SELinux for Internet of Things. In Proceedings of the IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 11–13 January 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Zhu, H.; Gehrmann, C. Kub-Sec, an automatic Kubernetes cluster AppArmor profile generation engine. In Proceedings of the 14th International Conference on Communication Systems & Networks (COMSNETS), Bangalore, India, 4–8 January 2022; pp. 129–137. [Google Scholar] [CrossRef]
- Babu, M.V.; Suman, K.N.; Srinivasa Rao, P. Drafting software as a practicing tool for engineering drawing-based courses: Content planning to its evaluation in client–server environment. Int. J. Mech. Eng. Educ. 2019, 47, 118–134. [Google Scholar] [CrossRef]
- Sparks, J. Enabling docker for HPC. Concurr. Computat. Pract. Exper. 2019, 31, e5018. [Google Scholar] [CrossRef]
- Wofford, Q.; Bridges, P.G.; Widener, P. A layered approach for modular container construction and orchestration in HPC environments. In Proceedings of the 11th Workshop on Scientific Cloud Computing, Renton, WA, USA, 21 June 2020; pp. 1–8. [Google Scholar] [CrossRef]
- Lyu, T.; Atmojo, U.D.; Vyatkin, V. Towards cloud-based virtual commissioning of distributed automation applications with IEC 61499 and containerization technology. In Proceedings of the IECON, 2021–47th Annual Conference of the IEEE Industrial Electronics Society, Toronto, ON, Canada, 13–16 October 2021; pp. 1–7. [Google Scholar] [CrossRef]
- Ecarot, T.; Dussault, S.; Souid, A.; Lavoie, L.; Ethier, J.F. AppArmor for health data access control: Assessing risks and benefits. In Proceedings of the 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Paris, France, 14–16 December 2020; pp. 1–7. [Google Scholar] [CrossRef]
- Kang, H.; Kim, J.; Shin, S. Minicon: Automatic enforcement of a minimal capability set for security-enhanced containers. In Proceedings of the IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, 21–24 April 2021; pp. 1–5. [Google Scholar] [CrossRef]
Class | Verification Item | Description |
---|---|---|
Positive | PEnforce_P1 |
|
Negative | PEnforce_N1 |
|
PEnforce_N2 |
| |
PEnforce_N3 |
|
SELinux policy registration CPU usage rate (%) | 1 | 2 | 3 | 4 | 5 | Average | Standard deviation |
3.8 | 3.6 | 2.9 | 3.6 | 3.4 | 3.60 | 0.319 | |
6 | 7 | 8 | 9 | 10 | |||
3.3 | 3.6 | 4.0 | 4.0 | 3.8 | |||
Proposed architecturepolicy registration CPU usage rate (%) | 1 | 2 | 3 | 4 | 5 | Average | Standard deviation |
4.8 | 5.1 | 4.4 | 3.9 | 4.4 | 4.57 | 0.445 | |
6 | 7 | 8 | 9 | 10 | |||
4.2 | 4.6 | 4.0 | 5.1 | 5.2 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lee, H.-K.; Han, S.-H.; Lee, D. Kernel-Based Container File Access Control Architecture to Protect Important Application Information. Electronics 2023, 12, 52. https://doi.org/10.3390/electronics12010052
Lee H-K, Han S-H, Lee D. Kernel-Based Container File Access Control Architecture to Protect Important Application Information. Electronics. 2023; 12(1):52. https://doi.org/10.3390/electronics12010052
Chicago/Turabian StyleLee, Hoo-Ki, Sung-Hwa Han, and Daesung Lee. 2023. "Kernel-Based Container File Access Control Architecture to Protect Important Application Information" Electronics 12, no. 1: 52. https://doi.org/10.3390/electronics12010052
APA StyleLee, H.-K., Han, S.-H., & Lee, D. (2023). Kernel-Based Container File Access Control Architecture to Protect Important Application Information. Electronics, 12(1), 52. https://doi.org/10.3390/electronics12010052