Professional Documents
Culture Documents
(Download PDF) Elements of Cloud Computing Security A Survey of Key Practicalities 1St Edition Mohammed M Alani Auth Online Ebook All Chapter PDF
(Download PDF) Elements of Cloud Computing Security A Survey of Key Practicalities 1St Edition Mohammed M Alani Auth Online Ebook All Chapter PDF
https://textbookfull.com/product/guide-to-cisco-routers-
configuration-becoming-a-router-geek-mohammed-m-alani/
https://textbookfull.com/product/essentials-of-cloud-computing-a-
holistic-perspective-surianarayanan/
https://textbookfull.com/product/mobile-cloud-computing-models-
implementation-and-security-1st-edition-keke-gai/
https://textbookfull.com/product/cloud-technologies-an-overview-
of-cloud-computing-technologies-for-managers-1st-edition-mchaney/
Zen of Cloud Learning Cloud Computing by Examples on
Microsoft Azure 1st Edition Bai
https://textbookfull.com/product/zen-of-cloud-learning-cloud-
computing-by-examples-on-microsoft-azure-1st-edition-bai/
https://textbookfull.com/product/cloud-computing-and-big-data-
technologies-applications-and-security-mostapha-zbakh/
https://textbookfull.com/product/the-elements-of-relativity-
first-edition-david-m-wittman/
https://textbookfull.com/product/the-practice-of-family-therapy-
key-elements-across-models-suzanne-midori-hanna-editor/
https://textbookfull.com/product/privately-and-publicly-
verifiable-computing-techniques-a-survey-1st-edition-denise-
demirel/
SPRINGER BRIEFS IN COMPUTER SCIENCE
Mohammed M. Alani
Elements of
Cloud Computing
Security
A Survey of Key
Practicalities
123
SpringerBriefs in Computer Science
Series editors
Stan Zdonik, Brown University, Providence, Rhode Island, USA
Shashi Shekhar, University of Minnesota, Minneapolis, Minnesota, USA
Jonathan Katz, University of Maryland, College Park, Maryland, USA
Xindong Wu, University of Vermont, Burlington, Vermont, USA
Lakhmi C. Jain, University of South Australia, Adelaide, South Australia, Australia
David Padua, University of Illinois Urbana-Champaign, Urbana, Illinois, USA
Xuemin (Sherman) Shen, University of Waterloo, Waterloo, Ontario, Canada
Borko Furht, Florida Atlantic University, Boca Raton, Florida, USA
V.S. Subrahmanian, University of Maryland, College Park, Maryland, USA
Martial Hebert, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA
Katsushi Ikeuchi, University of Tokyo, Tokyo, Japan
Bruno Siciliano, Università di Napoli Federico II, Napoli, Italy
Sushil Jajodia, George Mason University, Fairfax, Virginia, USA
Newton Lee, Newton Lee Laboratories, LLC, Tujunga, California, USA
More information about this series at http://www.springer.com/series/10028
Mohammed M. Alani
Elements of Cloud
Computing Security
A Survey of Key Practicalities
123
Mohammed M. Alani
Department of Information Technology
Al-Khawarizmi International College
Abu Dhabi
United Arab Emirates
Cloud computing has begun to revolutionize people lives, business, and services.
The concept of cloud computing has emerged from virtualization and software
design concepts. The emergence of service computing has revolutionized the
software development methodologies. Cloud computing also offers different ser-
vices (SaaS, PaaS, and IaaS) and deployment paradigms (private, public, and
hybrid) that help business making relevant combinations that suit businesses and its
impact on the global economy. In addition, there are also a number of advance-
ments in the federation of clouds. However, challenges remain predominant to
make cloud computing as a successful technology that will reach people and
businesses. Such major challenges include cloud security, multitenancy, elasticity,
secure and scalable service development and business sustainability.
This book has taken a major step in providing a breadth of knowledge on cloud
security with elegance, examples, and comprehensive. This book has presented
cloud security concepts in a simplified manner and elegant. Firstly, this book
introduces the general concepts of cloud computing and then takes the reader very
deeply into general concepts of cloud security techniques. This book has been well
organized elegantly with five chapters.
Chapter 1 introduces the basic concepts and its underpinning technologies of
cloud computing with simple illustration for all types of readers to understand. This
chapter also explains the cloud’s different service models and different deployment
models. This chapter concludes with a discussion of cloud computing benefits to
organizations.
Chapter 2 provides a brief introduction to cloud security. This chapter also
discusses why cloud security is different from classical systems security.
Chapter 3 introduces to security threats in cloud computing very elegantly with
detailed definitions of nine security threats such as data breaches, data loss, account
or service hijacking, insecure interfaces and APIs, threats to availability, malicious
insiders, abuse of cloud services, insufficient due diligence, and shared-technology
vulnerabilities. In addition to the notorious nine, this chapter also explains
v
vi Foreword
additional threats such as lock-in, incomplete data deletion, and loss of governance
among other threats along with their mitigation techniques.
Chapter 4 provides examples of cloud security attacks. A group of the most
common attacks on the cloud was presented: denial-of-service attacks, hypervisor
attacks, resource-freeing attacks, side-channel attacks, and attacks on confiden-
tiality. This chapter also discusses mitigation techniques of those attacks.
Finally, Chap. 5 presents a short list of general security recommendations for the
cloud adoption with emphasis given to good practice guidelines.
I am sure this book will make a huge impact on research as well as teaching and
will add to a list of recommended books on cloud security. In light of the significant
and fast emerging challenges that cloud computing face today, the author of this
book has done an outstanding job in selecting the contents of this book. I am
confident that this book will provide an appreciated contribution to the cloud
computing and security community. It has the potential to become one of the main
reference points for the years to come.
vii
viii Preface
deletion, and loss of governance among other threats along with their mitigation
techniques.
Security attacks on the cloud are discussed in Chap. 4. A group of the most
common attacks on cloud was presented: denial-of-service attacks, hypervisor
attacks, resource-freeing attacks, side-channel attacks, and attacks on confiden-
tiality. This chapter also discusses mitigation techniques of those attacks.
Chapter 5 presents a short list of general security recommendations for the cloud.
If you are familiar with the general concepts of the cloud, its service models, and
the underlying technologies, you can skip Chap. 1. If you have general knowledge
about cloud security and how it is different from classic information security, you
can skip Chap. 2 as well.
If you are new to the field of cloud computing, it is suggested that you start from
Chap. 1 and go all the way up to Chap. 5.
Acknowledgments
Finally, I would like to thank my editors in Springer. You have made this project
easy and simple. Thank you for believing in me. My final thanks go to my family,
Marwa, little Aya and Mustafa, and mom and dad. Thank you all for enduring me
during the time of working on this brief and all my life. I could not have been
blessed more.
ix
x Contents
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Acronyms
xi
Chapter 1
What is the Cloud?
Keywords Cloud computing · IaaS · PaaS · SaaS · Private cloud · Public cloud
1.1 Introduction
The main purpose of creating networks is, simply, sharing resources. These resources
can be files, photographs, printers, space on a hard disk, or a music file we would like
to listen together. Networks have helped us become more connected with everything
and everyone around us. Currently, networks provide us with many services including
the World Wide Web (WWW), electronic mail, voice over-internet-protocol (VoIP),
instant messaging, and many other services.
Network services usually fall into one of two models: peer to peer and client–
server. In a peer-to-peer network service, computers can communicate directly with-
out the need to be connected all the time nor the need to have an always-on server to
supervise the process. In client–server model, one device acts as a client that requests
a service from another device called the server. The server needs to be always on and
always connected and waits for client requests.
So many services on the Internet, and even on local networks, operate based on a
client–server model. For example, to view a webpage using WWW service, a client
sends a request to view a specific webpage identified by a Uniform Resource Locator
(URL) to a server, namely a web server. The server is just sitting there waiting for
client requests. When you check your e-mail, the software that you use, like Outlook,
or Thunderbird, acts as a client and asks the e-mail server to send information about
new messages. Even services that operates on the peer-to-peer model, like voice chat,
rely partially on client–server model. Most voice chat services work in the following
sequence:
1. Your client software connects to a server and registers your IP address.
2. The other side’s client software connects to the same server to register its IP
address.
3. When you want to make a voice call to the other side, your client software contacts
the server to check whether the other side is online, and if it is online, what is its
IP address.
4. Your client software initiates a voice call to the other client directly.
As you can see, the actual peer-to-peer communication occurred only at Step 4, while
the first three steps were all client–server activities. What we want to conclude from
this explanation is that client–server model is essential in most network services we
use in our daily life. Servers are an essential part of the client–server model. That is
basically why we are studying cloud computing.
When an organization works on setting up a network service, an essential part of
the preparation is to select a suitable server. The organization chooses the hardware
specifications based on the application requirements. In addition to the server hard-
ware, there are other components that need to be provided to host the network service
successfully including security, Internet connectivity, and backup electricity. The IT
manager, wanting to get rid of all of this responsibility of keeping the service up
and running all the time, suggests that the organization should outsource hosting the
network service. This would push the burden of managing the server availability and
security to another organization. Three possible scenarios are available now: shared
hosting, Virtual Private Server (VPS), and dedicated servers.
Shared hosting is out of the question if the network service requires any server
control and it is more than just a simple website with a limited number of visitors. The
second solution is which is renting a dedicated server. Dedicated servers are physical
servers with specifications selected by the client (most of the time). These servers
are hosted by a service provider that provides all the necessary support like Internet
connection, firewall, and sometimes off-line backup. Usually, these dedicated servers
are very costly as compared to VPSs. VPS can be an economic solution where a
service provider uses a physical server with high specifications to host a group of
logical servers and rent those servers (for a monthly or annual fee) to client individuals
or organizations. This can be a suitable solution if your network service does not
require a lot of processing power and the number of users is limited.
The general concept of cloud computing, although it was holding a different name,
goes back to 1961 [1]. A well-known computer scientist named John McCarthy
stated, at the MIT Centennial
1.2 History of Cloud Computing 3
“computers of the kind I have advocated become the computers of the future, then
computing may someday be organized as a public utility just as the telephone system is
a public utility... The computer utility could become the basis of a new and important
industry.”
The term utility computing refers to a computer-on-demand service that can be
used by the public with a pay-for-what-you-use financial model. The term has been
evolving since then.
The idea was slightly matured before the end of the 1990s when Salesforce.com
introduced the first remotely provisioned service to the enterprise. Afterward, the
concept started being different near the end of the 1990s. The concepts then focused
on an abstraction layer used to facilitate data delivery methods in packet-switched
heterogeneous networks.
In 2002, Amazon.com introduced Amazon Web Services (AWS) platform. The
platform, back then, provided remotely provisioned computing resources and storage.
Commercially, the term “cloud computing” emerged in 2006 when Amazon
launched its Elastic Compute Cloud (EC2) services. The service model was based
on “leasing” elastic computing processing power and storage where enterprises can
run their apps. Later that year, Google also started providing Google Apps.
Cloud computing was identified by NIST in [2] as
“a model for enabling ubiquitous, convenient, on-demand network access to a shared
pool of configurable computing resources (e.g., networks, servers, storage, appli-
cations, and services) that can be rapidly provisioned and released with minimal
management effort or service provider interaction.”
We can identify the Internet as a network of networks from all around the world.
Since, in the broad sense, the cloud uses the Internet as a provisioning medium, the
term “cloud” comes as a metaphor for the Internet itself. A better understanding of
the history of cloud computing can be understood by knowing the combination of
technologies that had evolved into the cloud. The next section will discuss those
technologies briefly.
1.3.1 Virtualization
Fig. 1.1 Comparison of traditional server architecture and virtual server architecture
Fig. 1.2 Individual physical server utilization versus virtualized server utilization
virtualization host can result in the creation of one virtual machine for each organi-
zation. This will result in cost saving, both in capital expenditures and in operational
expenditures, and much better resource utilization.
1.3.2 Clustering
As with any other system, cloud computing includes vulnerabilities. These vulner-
abilities, when exploited by attackers, can cause service disruptions, data loss, data
theft, etc. Given the nature of dynamic resource sharing that take place in the cloud, it
is possible that classical attacks and vulnerabilities can cause more harm on a cloud
system if it is not protected properly.
The context in which network security can be discussed can identify a long list
of threats and attacks. However, the dynamic and unique nature of the cloud can
require additional measures and this nature also opens the door for a whole new list
of attacks that can be used against the cloud.
Nothing explains this better than an example. One of the unique characteristics of
the cloud is availability. The cloud is designed to be available all the time. Whether
it is a private or a public cloud, availability is an undeniable feature that many
organizations seek. What if attackers target availability of the cloud?
One of the major reasons why organizations decide to switch to a cloud envi-
ronment is the you-pay-for-what-you-use business model. No one likes paying for
resource that are not very well utilized. Hence, when an attack such as Denial-of-
Service (DoS) attack happens, not only availability is targeted.
Denial of Service (DoS) attacks aim at making a certain network service unavail-
able to its legitimate users. In its basic form, these attacks keep the resources busy
such that these resources become unavailable to the users this service was aimed to
serve.
Using DoS attacks on the cloud, the attacker can cause huge financial implications
by consuming high resources in the trial of making the service unavailable. So, for
the organization using the cloud, it is a doubled loss.
The organization will be paying a lot of money for the resources consumed by
the attack and, after a while, the organization’s service will be unavailable due to the
DoS attack. This type of attacks is referred to as Fraudulent Resource Consumption
(FRC) [3].
The previous example shows us how the same attack can have different effect
on different technology. For example, DoS attack on a classic server would render
the service unavailable. If the same attack happens on a mobile ad hoc network, it
would make the service unavailable and consume valuable battery life [4]. On the
other hand, DoS on the cloud would render the service unavailable and cost the
organization a lot of money for the consumed resources. This is why the uniqueness
of the cloud technology open the door for unique attacks or at least unique effects of
old common attacks.
Having the multiple layers discussed in Chap. 1, cloud computing can be target
for attacks at any of these levels. We will see in the coming chapters that threats
exist at virtually any lever of the cloud computing system. As you will see, there are
threats at the hypervisor level, threats at the platform level, threats at the software
level, etc. All of these attacks are unique to cloud computing alone and cannot be
used on classical network security model.
Another random document with
no related content on Scribd:
poor Galilean, and even their gravest and most puzzling attacks
upon his wisdom and prudence, turned into an absolute jest against
them,――it was quite clear that the amused and delighted multitude
would soon cease to regard the authority and opinions of their
venerable religious and legal rulers, whose subtleties were so easily
foiled by one of the common, uneducated mass. But the very
circumstances which effected and constituted the evil, were also the
grand obstacles to the removal of it. Jesus was by these means
seated firmly in the love and reverence of the people,――and of the
vast numbers of strangers then in Jerusalem at the feast, there were
very many who would have their feelings strongly excited in his
favor, by the circumstance that they, as well as he, were Galileans,
and would therefore be very apt to make common cause with him in
case of any violent attack. All these obstacles required management;
and after having been very many times foiled in their attempts to
seize him, by the resolute determination of the thousands by whom
he was always encircled, to defend him, they found that they must
contrive some way to get hold of him when he was without the
defenses of this admiring host. This could be done, of course, only
by following him to his secret haunts, and coming quietly upon him
before the multitude could assemble to his aid. But his movements
were altogether beyond their notice. No armed band could follow him
about, as he went from the city to the country in his daily and nightly
walks. They needed some spy who could watch his private
movements when unattended, save by the little band of the twelve,
and give notice of the favorable moment for a seizure, when the
time, the place, and the circumstances, would all conspire to prevent
a rescue. Thus taken, he might be safely lodged in some of the
impregnable fortresses of the temple and city, so as to defy the
momentary burst of popular rage, on finding that their idol had been
taken away. They knew too, the fickle character of the commonalty,
well enough to feel certain, that when the tide of condemnation was
once strongly set against the Nazarene, the lip-worship of
“Hosannas” could be easily turned, by a little management, into the
ferocious yell of deadly denunciation. The mass of the people are
always essentially the same in their modes of action. Mobs were
then managed by the same rules as now, and demagogues were
equally well versed in the tricks of their trade. Besides, when Jesus
had once been formally indicted and presented before the secular
tribunal of the Roman governor, as a rioter and seditious person, no
thought of a rescue from the military force could be thought of; and
however unwilling Pilate might be to minister to the wishes of the
Jews, in an act of unnecessary cruelty, he could not resist a call thus
solemnly made to him, in the character of preserver of the Roman
sway, though he would probably have rejected entirely any
proposition to seize Jesus by a military force, in open day, in the
midst of the multitude, so as to create a troublesome and bloody
tumult, by such an imprudent act. In the full consideration of all these
difficulties, the Jewish dignitaries were sitting in conclave, contriving
means to effect the settlement of their troubles, by the complete
removal of him who was unquestionably the cause of all. At once
their anxious deliberations were happily interrupted by the entrance
of the trusted steward of the company of Jesus, who changed all
their doubts and distant hopes into absolute certainty, by offering, for
a reasonable consideration, to give up Jesus into their hands, a
prisoner, without any disturbance or riot. How much delay and
debate there was about terms, it would be hard to say; but after all,
the bargain made, does not seem to have been greatly to the credit
of the liberality of the Sanhedrim, or the sharpness of Judas. Thirty
of the largest pieces of silver then coined, would make but a poor
price for such an extraordinary service, even making all allowance
for a scarcity of money in those times. And taking into account the
wealth and rank of those concerned, as well as the importance of the
object, it is fair to pronounce them a very mean set of fellows. But
Judas especially seems to forfeit almost all right to the character
given him of acuteness in money matters; and it is only by supposing
him to be quite carried out of his usual prudence, by his woful
abandonment to crime, that so poor a bargain can be made
consistent with the otherwise reasonable view of his character.
A very striking difference is noticeable between the account given by Matthew of the
death of Judas, and that given by Luke in the speech of Peter, Acts i. 18, 19. The various
modes of reconciling these difficulties are found in the ordinary commentaries. In respect to
a single expression in Acts i. 18, there is an ingenious conjecture offered by Granville Penn,
in a very interesting and learned article in the first volume of the transactions of the Royal
Society of Literature, which may very properly be mentioned here, on account of its
originality and plausibility, and because it is found only in an expensive work, hardly ever
seen in this country. Mr. Penn’s view is, that “the word ελακησε (elakese,) in Acts i. 18, is
only an inflection of the Latin verb, laqueo, (to halter or strangle,) rendered insititious in the
Hellenistic Greek, under the form λακεω.” He enters into a very elaborate argument, which
can not be given here, but an extract may be transcribed, in order to enable the learned to
apprehend the nature and force of his views. (Translated by R. S. Lit. Vol. I. P. 2, pp. 51,
52.)
“Those who have been in the southern countries of Europe know, that the operation in
question, as exercised on a criminal, is performed with a great length of cord, with which the
criminal is precipitated from a high beam, and is thus violently laqueated, or snared in a
noose, mid-way――medius or in medio; μεσος, and medius, referring to place as well as to
person; as, μεσος ὑμων ἑστηκεν. (John i. 26.) ‘Considit scopulo medius――――’ (Virgil,
Georgics, iv. 436.) ‘―――― medius prorumpit in hostes.’ (Aeneid, x. 379.)
“Erasmus distinctly perceived this sense in the words πρηνης γενομενος, although he did
not discern it in the word ελακησε, which confirms it: ‘πρηνης Graecis dicitur, qui vultu est in
terram dejecto: expressit autem gestum et habitum laqueo praefocati; alioquin, ex hoc
sane loco non poterat intelligi, quod Judas suspenderit se,’ (in loc.) And so Augustine also
had understood those words, as he shows in his Recit. in Act. Apostol. l. i. col. 474. ‘et
collem sibi alligavit, et dejectus in faciem,’ &c. Hence one MS., cited by Sabatier, for πρηνης
γενομενος, reads αποκρεμαμένος; and Jerom, in his new vulgate, has substituted suspensus
for the pronus factus of the old Latin version, which our old English version of 1542
accordingly renders, and when he was hanged.
“That which follows, and which evidently determined the vulgar interpretation of
ελακησε――εξεχυνθη παντα τα σπλαγχνα αυτου, all his bowels gushed out――states a natural
and probable effect produced, by the sudden interruption in the fall and violent capture in
the noose, in a frame of great corpulency and distension, such as Christian antiquity has
recorded that of the traitor to have been; so that a term to express rupture would have been
altogether unnecessary, and it is therefore equally unnecessary to seek for it in the verb
ελακησε. Had the historian intended to express disruption, we may justly presume that he
would have said, as he had already said in his gospel, v. 6, διερρηγνυτο, or xxiii. 45, εσχισθη
μεσος: it is difficult to conceive, that he would here have traveled into the language of
ancient Greek poetry for a word to express a common idea, when he had common terms at
hand and in practice; but he used the Roman laqueo, λακεω, to mark the infamy of the
death.
“(Πρησθεις επι τοσουτον την σαρκα, ὡστε μη δυνασθαι δειλθειν. Papias, from Routh's
Reliquiæ Sacræ tom. I. p. 9. and Oecumenius, thus rendered by Zegers, Critici Sacri, Acts i.
18, in tantum enim corpore inflatus est ut progredi non posset. The tale transmitted by those
writers of the first and tenth centuries, that Judas was crushed to death by a chariot
proceeding rapidly, from which his unwieldiness rendered him unable to escape, merits no
further attention, after the authenticated descriptions of the traitor’s death which we have
here investigated, than to suggest a possibility that the place where the suicide was
committed might have overhung a public way, and that the body falling by its weight might
have been traversed, after death, by a passing chariot;――from whence might have arisen
the tales transmitted successively by those writers; the first of whom, being an inhabitant of
Asia Minor, and therefore far removed from the theater of Jerusalem, and being also (as
Eusebius witnesses, iii. 39,) a man of a very weak mind――σφοδρα μκρος τον νουν――was
liable to be deceived by false accounts.)
“The words of St. Peter, in the Hellenistic version of St. Luke, will therefore import,
praeceps in ora fusus, laqueavit (i. e. implicuit se laqueo) medius; (i. e. in medio, inter
trabem et terram;) et effusa sunt omnia viscera ejus――throwing himself headlong, he
caught mid-way in the noose, and all his bowels gushed out. And thus the two reporters of
the suicide, from whose respective relations charges of disagreement, and even of
contradiction, have been drawn in consequence of mistaking an insititious Latin word for a
genuine Greek word of corresponding elements, are found, by tracing that insititious word to
its true origin, to report identically the same fact; the one by a single term, the other by a
periphrasis.”
Such was the end of the twelfth of Jesus Christ’s chosen ones. To
such an end was the intimate friend, the trusted steward, the festal
companion of the Savior, brought by the impulse of some not very
unnatural feelings, excited by occasion, into extraordinary action.
The universal and intense horror which the relation of his crime now
invariably awakens, is by no means favorable to a just and fair
appreciation of his sin and its motives, nor to such an honest
consideration of his course from rectitude to guilt, as is most
desirable for the application of the whole story to the moral
improvement of its readers. Originally not an infamous man, he was
numbered among the twelve as a person of respectable character,
and long held among his fellow-disciples a responsible station, which
is itself a testimony of his unblemished reputation. He was sent forth
with them, as one of the heralds of salvation to the lost sheep of the
house of Israel. He shared with them the counsels, the instructions,
and the prayers of Jesus. If he was stupid in apprehending, and
unspiritual in conceiving the truths of the gospel, so were they. If he
was an unbeliever in the resurrection of Jesus, so were they; and
had he survived till the accomplishment of that prophecy, he could
not have been slower in receiving the evidence of the event, than
they. As it was, he died in his unbelief; while they lived to feel the
glorious removal of all their doubts, the purification of all their gross
conceptions, and the effusion of that spirit of truth, through which, by
the grace of God alone, they afterwards were what they were.
Without a merit, in faith, beyond Judas, they maintained their dim
and doubtful adherence to the truth, only by their nearer
approximation to moral perfection; and by their nobler freedom from
the pollution of sordid and spiteful feeling. Through passion alone he
fell, a victim, not to a want of faith merely,――for therein, the rest
could hardly claim a superiority,――but to the radical deficiency of
true love for Jesus, of that “charity which never faileth,” but “endureth
to the end.” It was their simple, devoted affection, which, through all
their ignorance, their grossness of conception, and their
faithlessness in his word, made them still cling to his name and his
grave, till the full revelations of his resurrection and ascension had
displaced their doubts by the most glorious certainties, and given
their faith an eternal assurance. The great cause of the awful ruin of
Judas Iscariot, then, was the fact, that he did not love Jesus. Herein
was his grand distinction from all the rest; for though their regard
was mingled with so much that was base, there was plainly, in all of
them, a solid foundation of true, deep affection. The most ambitious
and skeptical of them, gave the most unquestionable proofs of this.
Peter, John, both the Jameses, and others, are instances of the
mode in which these seemingly opposite feelings were combined.
But Judas was without this great refining and elevating principle,
which so redeemed the most sordid feelings of his fellows. It was not
merely for the love of money that he was led into this horrid crime.
The love of four dollars and eighty cents! Who can believe that this
was the sole motive? It was rather that his sordidness and
selfishness, and ambition, if he had any, lacked this single, purifying
emotion, which redeemed their characters. Is there not, in this
reflection, a moral which each Christian reader can improve to his
own use? For the lack of the love of Jesus alone, Judas fell from his
high estate, to an infamy as immortal as their fame. Wherever,
through all ages, the high heroic energy of Peter, the ready faith of
Andrew, the martyr-fire of James Boanerges, the soul-absorbing love
of John, the willing obedience of Philip, the guileless purity of
Nathanael, the recorded truth of Matthew, the slow but deep
devotion of Thomas, the blameless righteousness of James the Just,
the appellative zeal of Simon, and the earnest warning eloquence of
Jude, are all commemorated in honor and bright renown,――the
murderous, sordid spite of Iscariot, will insure him an equally lasting
proverbial shame. Truly, “the sin of judas is written with a pen
of iron on a tablet of marble.”
MATTHIAS.
The events which concern this person’s connection with the
apostolic company, are briefly these. Soon after the ascension of
Jesus, the eleven disciples being assembled in their “upper room,”
with a large company of believers, making in all, together, a meeting
of one hundred and twenty, Peter arose and presented to their
consideration, the propriety and importance of filling, in the apostolic
college, the vacancy caused by the sad defection of Judas Iscariot.
Beginning with what seems to be an apt allusion to the words of
David concerning Ahithophel,――(a quotation very naturally
suggested by the striking similarity between the fate of that ancient
traitor, and that of the base Iscariot,) he referred to the peculiarly
horrid circumstances of the death of this revolted apostle, and also
applied to these occurrences the words of the same Psalmist
concerning those upon whom he invoked the wrath of God, in words
which might with remarkable emphasis be made descriptive of the
ruin of Judas. “Let his habitation be desolate,” and “let another take
his office.” Applying this last quotation more particularly to the
exigency of their circumstances, he pronounced it to be in
accordance with the will of God that they should immediately
proceed to select a person to “take the office” of Judas. He declared
it an essential requisite for this office, moreover, that the person
should be one of those who, though not numbered with the select
twelve, had been among the intimate companions of Jesus, and had
enjoyed the honors and privileges of a familiar discipleship, so that
they could always testify of his great miracles and divine instructions,
from their own personal knowledge as eye-witnesses of his actions,
from the beginning of his divine career at his baptism by John, to the
time of his ascension.
Agreeably to this counsel of the apostolic chief, the whole
company of the disciples selected two persons from those who had
been witnesses of the great actions of Christ, and nominated them to
the apostles, as equally well qualified for the vacant office. To decide
the question with perfect impartiality, it was resolved, in conformity
with the common ancient practice in such cases, to leave the point
between these two candidates to be settled by lot; and to give this
mode of decision a solemnity proportioned to the importance of the
occasion, they first invoked, in prayer, the aid of God in the
appointment of a person best qualified for his service. They then
drew the lots of the two candidates, and Matthias being thus
selected, was thenceforth enrolled with the eleven apostles.
SAUL,
AFTERWARDS NAMED PAUL.
his country.
This account by Ammianus Marcellinus is found in book XIV. of his history, (p. 19, edited
by Vales.)
The native land of Saul was classic ground. Within the limits of
Cilicia, were laid the scenes of some of the most splendid passages
in early Grecian fable; and here too, were acted some of the
grandest events in authentic history, both Greek and Roman. The
very city of his birth, Tarsus, is said to have been founded by
Perseus, the son of Jupiter and Danae, famed for his exploit at
another place on the shore of this part of the Mediterranean. More
authentic history however, refers its earliest foundation to
Sardanapalus, king of Assyria, who built Tarsus and Anchialus in
Cilicia, nine hundred years before Christ. Its origin is by others
ascribed to Triptolemus with an Argive colony, who is represented on
some medals as the founder. These two stories may be made
consistent with each other, on the supposition that the same place
was successively the scene of the civilizing influence of each of