Computer Science Infrastructure Security for Virtual Cloud Computing Peng Ning 04/08/111BITS/ Financial Services Roundtable Supported by the US National.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

SLA-Oriented Resource Provisioning for Cloud Computing
System Center 2012 R2 Overview
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang Department of Computer Science, North Carolina State University Xiaolan Zhang IBM T.J. Watson Research.
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Xen , Linux Vserver , Planet Lab
Computer Science HyperSentry: Enabling Stealthy In-context Measurement of Hypervisor Integrity Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang North Carolina.
 Max Planck Institute for Software Systems Towards trusted cloud computing Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues MPI-SWS.
Computer Science Cloud Computing Infrastructure Security Peng Ning With Ahmed Azab, Xiaolan Zhang, Wu Zhou, Xuxian Jiang, and Zhi Wang. June 29, 20121ACNS.
@ NCSU Zhi NCSU Xuxian Microsoft Research Weidong Microsoft NCSU Peng NCSU ACM CCS’09.
Copyright 2009 Trend Micro Inc. Classification 11/3/10 1 Andy Dancer CTO – Trend Micro, EMEA Virtualisation and Cloud: New security for a new era.
Jiang Wang, Joint work with Angelos Stavrou and Anup Ghosh CSIS, George Mason University HyperCheck: a Hardware Assisted Integrity Monitor.
5205 – IT Service Delivery and Support
Virtualization: An Overview Brendan Lynch. Forms of virtualization In all cases virtualization is taking a physical component and simulating the interface.
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Tanenbaum 8.3 See references
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Copyright © 2010 Platform Computing Corporation. All Rights Reserved.1 The CERN Cloud Computing Project William Lu, Ph.D. Platform Computing.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
August 27, 2008 Platform Market, Business & Strategy.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
Jakub Szefer, Eric Keller, Ruby B. Lee Jennifer Rexford Princeton University CCS October, 2011 報告人:張逸文.
Cloud Models – Iaas, Paas, SaaS, Chapter- 7 Introduction of cloud computing.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
Introduction to VMware Virtualization
+ CS 325: CS Hardware and Software Organization and Architecture Cloud Architectures.
Cloud Computing 1. Outline  Introduction  Evolution  Cloud architecture  Map reduce operation  Platform 2.
Kenichi Kourai (Kyushu Institute of Technology) Takuya Nagata (Kyushu Institute of Technology) A Secure Framework for Monitoring Operating Systems Using.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
= WEEKS, MONTHS, YEARS OF DELAYED APPLICATION VALUE MISSED REVENUE OPPORTUNITIES, INCREASED COST AND RISK DEV QA PACKAGE COMMERCIAL SOFTWARE CUSTOM APPLICATION.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
A Framework for Elastic Execution of Existing MPI Programs Aarthi Raveendran Tekin Bicer Gagan Agrawal 1.
Ether: Malware Analysis via Hardware Virtualization Extensions Author: Artem Dinaburg, Paul Royal, Monirul Sharif, Wenke Lee Presenter: Yi Yang Presenter:
COMS E Cloud Computing and Data Center Networking Sambit Sahu
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
Countering Kernel Rootkits with Lightweight Hook Protection Presented by: Hector M Lugo-Cordero, MS CAP 6135 March 24, 2011.
High Performance Computing on Virtualized Environments Ganesh Thiagarajan Fall 2014 Instructor: Yuzhe(Richard) Tang Syracuse University.
Thomas Ristenpart,Eran Tromer, Horav Shahcham and Stefan Savage
 Introduction  Prior research  Problem overview  HookSafe Design  Implementation  Evaluation  Experiment result Conclusion.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
Bart Miller – October 22 nd,  TCB & Threat Model  Xen Platform  Xoar Architecture Overview  Xoar Components  Design Goals  Results  Security.
Virtual Infrastructure By: Andy Chau Farzana Mohsini Anya Mojiri Virginia Nguyen Bobby Phimmasane.
Improving Xen Security through Disaggregation Derek MurrayGrzegorz MilosSteven Hand.
Trusted Virtual Machine Images a step towards Cloud Computing for HEP? Tony Cass on behalf of the HEPiX Virtualisation Working Group October 19 th 2010.
Operating Systems Security
Security Vulnerabilities in A Virtual Environment
Full and Para Virtualization
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
© 2007 IBM Corporation IBM Software Strategy Group IBM Google Announcement on Internet-Scale Computing (“Cloud Computing Model”) Oct 8, 2007 IBM Confidential.
Study on “Secure In-VM Monitoring Using Hardware Virtualization” Qiang.Guan Dependable Computing System Lab New Mexico Tech.
SEMINAR ON.  OVERVIEW -  What is Cloud Computing???  Amazon Elastic Cloud Computing (Amazon EC2)  Amazon EC2 Core Concept  How to use Amazon EC2.
Chapter 6: Securing the Cloud
Breaking Up is Hard to Do
Build a low-touch, highly scalable cloud with IBM SmartCloud Provisioning Academic Initiative © 2011 IBM Corporation.
OS Virtualization.
Virtualization Layer Virtual Hardware Virtual Networking
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Shielding applications from an untrusted cloud with Haven
Countering Kernel Rootkits with Lightweight Hook Protection
Co-designed Virtual Machines for Reliable Computer Systems
Supports launch of cloud-based endpoint management service
Presentation transcript:

Computer Science Infrastructure Security for Virtual Cloud Computing Peng Ning 04/08/111BITS/ Financial Services Roundtable Supported by the US National Science Foundation (NSF) grant # and an IBM Open Collaboration Research (OCR) Award.

Computer Science Outline Background Security threats to virtual cloud computing Security architecture for virtual cloud computing –Hypervisor-based security services –VM image security services –Hypervisor integrity services –Bypassing hypervisor control Conclusion 04/08/112

Computer Science What is Cloud Computing Wikipedia –Cloud computing is a paradigm of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet –Users need not have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them Virtualization is a key to cloud computing –Scalability –Ease of use –Affordable pricing 04/08/113

Computer Science Virtual Cloud Computing Virtual cloud computing is emerging as a promising solution to IT management –Reduction in hardware, operational, and administrative costs Examples –Amazon’s Elastic Compute Cloud (EC2) –IBM Research Compute Cloud (RC2) –Microsoft Azure –NCSU Virtual Computing Lab (VCL) 04/08/114

Computer Science Requested webserver running Access requested webserver Amazon EC2 management consoleSelect a VM imageLaunch requested webserverEC2 starting the requested webserver Industry Example: Amazon Elastic Compute Cloud (EC2) 04/08/115

Computer Science Request reservationGet reservation Academic Example: NC State Virtual Computing Lab (VCL) 04/08/116 Use reserved computer

Computer Science Security of Virtual Cloud Computing Need for security –Customers Their workloads will not be subject to attacks –Cloud service providers Their cloud services will work normally –Other users Compute clouds will not be used as stepping stones to attack them 04/08/117

Computer Science Security Threats in Virtual Cloud Computing External threats Guest-to-guest threats Guest-to-cloud threats Cloud-to-guest threats 04/08/118

Computer Science Security of Virtual Cloud Computing Our proposal –A security architecture for virtual cloud computing Addition of security architecture components –Main context: platform as a service 04/08/119

Computer Science A Typical Virtual Compute Cloud 04/08/1110

Computer Science Virtualization-based Runtime Security Services 04/08/1111

Computer Science Virtualization-based Runtime Security Services (Cont’d) Goals –System integrity and application data confidentiality Strategy –Exploit the isolation and higher privilege of the hypervisor to protect the guest OS Technical problems being addressed –Semantic gap –Overhead of “world changes” 04/08/1112

Computer Science An Example Technique – HIMA HIMA –A Hypervisor based Integrity Measurement Agent –Measure all applications loaded into guest VMs –Actively monitor all guest events that could change measured applications Time of Check to Time of Use (TOCTTOU) consistency Prototype –Prototypes for both Xen and Linux/KVM 04/08/1113

Computer Science Some Evaluation Results 04/08/11 Application-benchmark 14

Computer Science VM Image Security Services 04/08/1115

Computer Science Nüwa – Offline Patching of VM Images Motivation –Dormant VM images usually contain vulnerabilities –Offline security updates: Security service by Olive Challenge –Current patching system: Designed for running systems –Pre- and post-processing scripts –Examples: Stop/start daemons; conditional updates Nüwa approach –Script rewriting Offline patching of individual images in emulated environments Batched offline patching using Mirage –Leftovers: Resort to online updates Nüwa automated online update utility 04/08/1116

Computer Science Some Evaluation Results Performance gain by standalone Nüwa 04/08/1117 * 99% of patches can be applied offline * “Average” refers to the average of all 402 packages.

Computer Science Some Evaluation Results (Cont’d) Additional speedup by Mirage-based Nüwa –Another 2 – 10 times –Speedup increases as # images grows 04/08/1118

Computer Science Hypervisor Integrity Services 04/08/1119

Computer Science Why Hypervisor Integrity Services? Many virtualization-based security mechanisms assume the hypervisor is trusted –Examples: Lares, SIM, HookSafe, Patagonix, HIMA, … Hypervisors cannot be blindly trusted –Example #1 Two backdoors in Xen [BlackHat 2008] –Example #2 VM Ware ESX 3.x: 50 Secunia advisories; 368 vulnerabilities; 10% Secunia advisories not patched (Visited on 10/14/10) –Existing hypervisor's code base is growing More vulnerabilities are likely It is necessary to ensure hypervisor integrity 04/08/1120

Computer Science HyperSentry A generic framework to stealthily measure the integrity of a hypervisor in its context Key ideas –Allow the measurement software to gain the highest privilege temporarily –Measurement is triggered stealthily Scrubbing attacks –Isolate measurement results from the hypervisor 04/08/1121

Computer Science Some Evaluation Results IBM HS21XM blade server Measuring the Xen hypervisor –End-to-end execution time: 35 ms –Periodical measurement: Every 8 seconds: 2.4% overhead; every 16 seconds: 1.3% overhead 2204/08/11

Computer Science Isolated Execution to Bypass Hypervisor Control 04/08/1123

Computer Science Why Bypassing Hypervisor Control? Cloud service provider can see everything in guest workloads –How to process sensitive data in customers’ workloads? It is desirable to allow customers to have isolated execution bypassing hypervisor control –On-going work… 04/08/1124

Computer Science Conclusion Security of virtual cloud computing –Necessary for new research –Potentially fruitful research area Security architecture for virtual cloud computing –Hypervisor-based runtime security services –VM image security services –Integrity of hypervisors –Isolated execution bypassing hypervisor control –Not necessarily complete 04/08/1125

Computer Science Questions? Thank You! 04/08/1126