Attribute Based Management of Secure Kubernetes Cloud Bursting
Attribute Based Management of Secure Kubernetes Cloud Bursting
Cloud Bursting
ABSTRACT
In modern cloud computing, the need for flexible and scalable orchestration of
services, combined with robust security measures, is paramount. In this paper, we
propose an innovative approach for managing secure cloud bursting in Kubernetes,
combining Attribute-Based Encryption (ABE) with Kubernetes labeling. Our model
addresses the challenges of complexity, cost, and data protection compliance by
leveraging both Kubernetes and ABE. We introduce an attribute-based bursting
component that uses Kubernetes labels for orchestration, and an encryption
component that employs ABE for data protection. This unified management model
ensures data confidentiality while enabling efficient cloud bursting. Our approach
combines the strengths of label-based orchestration with fine-grained encryption,
providing a technologically advanced yet user-friendly solution for secure cloud
bursting. We present a proof-of-concept implementation that demonstrates the
feasibility and effectiveness of our model. Our approach offers a unified solution that
complies with security and privacy laws while meeting the needs of contemporary
cloud-based systems.
EXISTING SYSTEM
The recent proposal by Chen et al., RABE-DI [33], is an ABE scheme capable of
addressing a different problem, namely protecting data integrity after user revocation,
ensuring better efficiency compared to state-of-the-art proposals.
Bera et al. [22] propose an approach named Attribute- Based verifiable Data Storage
and data Retrieval Scheme (ABDSRS) for cloud environments. It employs an
attribute based online-offline mechanism, in which only authorized data owners can
anonymously upload data to the cloud. In addition, a data user can perform searching
operations over encrypted data by using keyword policy.
Ahuja and Mohanty [15] propose an extension of CP-ABE in order to provide shared
access privileges among users and delegation of access privileges in a flexible
manner, without sacrificing scalability and fine-grained access control. The proposed
solution merges CP-ABE with a hierarchical structure [64] to achieve scalability by
decentralizing the key issuing authority at different levels of hierarchy. In more
detail, lower level users get secret keys from the users that have a higher position in
the hierarchy. The scheme results to be resistant to cheating and collusion attacks.
Finally, Chiquito et al. in [34] survey attribute-based approaches for access control to
data, focusing on policy management and enforcement. The paper aims at identifying
the key properties provided by ABAC and ABE that can be used to control data
access to prevent leakage to unauthorized users while providing easy-to-manage
policies. To achieve this goal, they identify knowledge gaps.
Disadvantages
An existing system didn’t explore CIPHERTEXT-POLICY ATTRIBUTE-
BASED ENCRYPTION.
An existing system didn't implement key-policy ABE (KP-ABE) data are
encrypted over a set of attributes and user keys allow accessing a tree which
can distinguish attributes.
Proposed System
In this paper we make use of Kubernetes, since today it is one of the most appreciate
tools for managing distributed systems, especially in the context of cloud computing.
It provides flexibility though different built-in components and tools. Among them,
the usage of labels and label selectors can be exploited to simplify cloud bursting
operations. While Kubernetes best practices recommend that labels be assigned
semantic meanings before being used [9], there is currently no standardized method
for enforcing this practice. Our goal is to develop a systematic approach in the
context of cloud bursting that ensures semantic meaning associated with the generic
Kubernetes label concept. Furthermore, it emerged that Kubernetes management
does not suitably address all the security aspects related to data confidentiality and
access controls, which are central in cloud bursting [6]. Kubernetes incorporates
access management, but it requires separate configuration processes that are
decoupled from the logic of the orchestrated functions. Moreover, the existing access
management mechanisms in Kubernetes have certain limitations in terms of
managing complex authorization scenarios and are constrained by their policy scope.
Hence, these limitations are challenging for achieving comprehensive and secure
resource management in the context of cloud bursting. To overcome these
limitations, in this paper we propose an architectural solution to address the security
challenges of cloud bursting that integrates the Kubernetes orchestration with
attribute-based encryption.
Advantages
1) Association of semantic meaning with key labels, giving them the role of
attributes. This approach adds context to the cloud bursting configuration and
improves label comprehension.
2) Leveraging the Attribute-Based Encryption (ABE) technology, deployed through a
cloud service, to improve security levels, in terms of data privacy, confidentiality,
and access control, through fine-grained policies. This ABE component works
seamlessly within the Kubernetes environment, aligning with attribute logic and
improving overall system security.
3) Simplification and speed-up of configuration based on a unified management layer
that handles holistically all attributes, including the ones directly used by Kubernetes
and by the ABE module. This unification ensures transparency and ease of use for
administrators, eliminating the need for separate configurations and additional
harmonization functions, as well as a streamlined experience.
SYSTEM REQUIREMENTS
Software Requirements:
Operating System - Windows XP
Coding Language - Java/J2EE(JSP,Servlet)
Front End - J2EE
Back End - MySQL