Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kennedy A. Torkura is active.

Publication


Featured researches published by Kennedy A. Torkura.


international conference for internet technology and secured transactions | 2015

Application of quantitative security metrics in cloud computing

Kennedy A. Torkura; Feng Cheng; Christoph Meinel

Security issues are still prevalent in cloud computing particularly public cloud. Efforts by Cloud Service Providers to secure out-sourced resources are not sufficient to gain trust from customers. Service Level Agreements (SLAs) are currently used to guarantee security and privacy, however research into SLAs monitoring suggests levels of dissatisfaction from cloud users. Accordingly, enterprises favor private clouds such as OpenStack as they offer more control and security visibility. However, private clouds do not provide absolute security, they share some security challenges with public clouds and eliminate other challenges. Security metrics based approaches such as quantitative security assessments could be adopted to quantify security value of private and public clouds. Software quantitative security assessments provide extensive visibility into security postures and help assess whether or not security has improved or deteriorated. In this paper we focus on private cloud security using OpenStack as a case study, we conduct a quantitative assessment of OpenStack based on empirical data. Our analysis is multi-faceted, covering OpenStack major releases and services. We employ security metrics to determine the vulnerability density, vulnerability severity metrics and patching behavior. We show that OpenStacks security has improved since inception, however concerted efforts are imperative for secure deployments, particularly in production environments.


signal image technology and internet based systems | 2015

Towards Cloud-Aware Vulnerability Assessments

Kennedy A. Torkura; Christoph Meinel

Vulnerability assessments are best practices for computer security and requirements for regulatory compliance. Potential and existing security holes can be identified during vulnerability assessments and security breaches could be averted. However, the unique nature of cloud computing environments requires more dynamic assessment techniques. The proliferation of cloud services and cloud-aware applications introduce more cloud vulnerabilities. But, current measures for identification, mitigation and prevention of cloud vulnerabilities do not suffice. Our investigations indicate a possible reason for this inefficiency to lapses in availability of precise, cloud vulnerability information. We observed also that most research efforts in the context of cloud vulnerability concentrate on IaaS, leaving other cloud models largely unattended. Similarly, most cloud assessment efforts tackle general cloud vulnerabilities rather than cloud specific vulnerabilities. Yet, mitigating cloud specific vulnerabilities is important for cloud security. Hence, this paper proposes a new approach that addresses the mentioned issues by monitoring, acquiring and adapting publicly available cloud vulnerability information for effective vulnerability assessments. We correlate vulnerability information from public vulnerability databases and develop Network Vulnerability Tests for specific cloud vulnerabilities. We have implemented, evaluated and verified the suitability of our approach.


utility and cloud computing | 2017

Integrating Continuous Security Assessments in Microservices and Cloud Native Applications

Kennedy A. Torkura; Muhammad I.H. Sukmana; Christoph Meinel

Cloud Native Applications (CNA) consists of multiple collaborating microservice instances working together towards common goals. These microservices leverage the underlying cloud infrastructure to enable several properties such as scalability and resiliency. CNA are complex distributed applications, vulnerable to several security issues affecting microservices and traditional cloud-based applications. For example, each microservice instance could be developed with different technologies e.g. programming languages and databases. This diversity of technologies increases the chances for security vulnerabilities in microservices. Moreover, the fast-paced development cycles of (CNA) increases the probability of insufficient security tests in the development pipelines, and consequent deployment of vulnerable microservices. Furthermore, cloud native environments are ephemeral, microservices are dynamically launched and de-registered, this factor creates a discoverability challenge for traditional security assessment techniques. Hence, security assessments in such environments require new approaches which are specifically adapted and integrated to CNA. In fact, such techniques are to be cloud native i.e. well integrated into the clouds fabric. In this paper, we tackle the above-mentioned challenges through the introduction of a novel Security Control concept - the Security Gateway. To support the Security Gateway concept, two other concepts are proposed: dynamic document store and security health endpoints. We have implemented these concepts using cloud-native design patterns and integrated them into the CNA workflow. Our experimental evaluations validate the efficiency of our proposals, the time overhead due to the security gateway is minimal and the vulnerability detection rate surpasses that of traditional security assessment approaches. Our proposal can therefore be employed to secure CNA and microservice-based implementations.


international conference for internet technology and secured transactions | 2015

A proposed framework for proactive vulnerability assessments in cloud deployments

Kennedy A. Torkura; Feng Cheng; Christoph Meinel

Vulnerability scanners are deployed in computer networks and software to timely identify security flaws and misconfigurations. However, cloud computing has introduced new attack vectors that requires commensurate change of vulnerability assessment strategies. To investigate the effectiveness of these scanners in cloud environments, we first conduct a quantitative security assessment of OpenStacks vulnerability lifecycle and discover severe risk levels resulting from prolonged patch release duration. More specifically, there are long time lags between OpenStack patch releases and patch inclusion in vulnerability scanning engines. This scenario introduces sufficient time for malicious actions and creation of exploits such as zero-days. Mitigating these concern requires systems with current knowledge on events within the vulnerability lifecycle. However, current vulnerability scanners are designed to depend on information about publicly announced vulnerabilities which mostly includes only vulnerability disclosure dates. Accordingly, we propose a framework that would mitigate these risks by gathering and correlating information from several security information sources including exploit databases, malware signature repositories and Bug Tracking Systems. The information is thereafter used to automatically generate plugins armed with current information about zero-day exploits and unknown vulnerabilities. We have characterized two new security metrics to describe the discovered risks.


security of information and networks | 2017

Redesign cloudRAID for flexible and secure enterprise file sharing over public cloud storage

Muhammad I.H. Sukmana; Kennedy A. Torkura; Christoph Meinel; Hendrik Graupner

CloudRAID is a secure personal cloud storage broker that provides data availability, security, and privacy for private usage. But some of the challenges need to be resolved to use CloudRAID as an enterprise cloud storage broker solution, such as complicated key management, absence of role-based hierarchical access control, and lack of administrative oversight. In this paper we tackle these challenges and propose an enterprise version of CloudRAID called CloudRAID for Business (CfB). We combine CloudRAID with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and implement administrative oversight for monitoring activities in CfB system and multiple CSPs. Our evaluation of CfB demonstrates that it offers robust security measures through fine-grained role-based access control, scalable key management for multi-user-and-device scenarios, reduces complexity of file sharing revocation, file-level security, and administrative oversight.


2017 IEEE International Conference on Smart Cloud (SmartCloud) | 2017

Leveraging Cloud Native Design Patterns for Security-as-a-Service Applications

Kennedy A. Torkura; Muhammad I.H. Sukmana; Feng Cheng; Christoph Meinel

This paper discusses a new approach for designing and deploying Security-as-a-Service (SecaaS) applications using cloud native design patterns. Current SecaaS approaches do not efficiently handle the increasing threats to computer systems and applications. For example, requests for security assessments drastically increase after a high-risk security vulnerability is disclosed. In such scenarios, SecaaS applications are unable to dynamically scale to serve requests. A root cause of this challenge is employment of architectures not specifically fitted to cloud environments. Cloud native design patterns resolve this challenge by enabling certain properties e.g. massive scalability and resiliency via the combination of microservice patterns and cloud-focused design patterns. However adopting these patterns is a complex process, during which several security issues are introduced. In this work, we investigate these security issues, we redesign and deploy a monolithic SecaaS application using cloud native design patterns while considering appropriate, layered security counter-measures i.e. at the application and cloud networking layer. Our prototype implementation out-performs traditional, monolithic applications with an average Scanner Time of 6 minutes, without compromising security. Our approach can be employed for designing secure, scalable and performant SecaaS applications that effectively handle unexpected increase in security assessment requests.


local computer networks | 2016

Towards Vulnerability Assessment as a Service in OpenStack Clouds

Kennedy A. Torkura; Christoph Meinel


network operations and management symposium | 2018

A threat modeling approach for cloud storage brokerage and file sharing systems

Kennedy A. Torkura; Muhammad I.H. Sukmana; Michael Meinig; Feng Cheng; Christoph Meinel; Hendrik Graupner


international conference on information networking | 2018

Unified logging system for monitoring multiple cloud storage providers in cloud storage broker

Muhammad I.H. Sukmana; Kennedy A. Torkura; Feng Cheng; Christoph Meinel; Hendrik Graupner


advanced information networking and applications | 2018

Securing Cloud Storage Brokerage Systems Through Threat Models

Kennedy A. Torkura; Muhammad I.H. Sukmana; Michael Meinig; Anne V. D. M. Kayem; Feng Cheng; Hendrik Graupner; Christoph Meinel

Collaboration


Dive into the Kennedy A. Torkura's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Feng Cheng

Hasso Plattner Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Michael Meinig

Hasso Plattner Institute

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge