Information Security and Cloud Computing Naresh K. Sehgal, Sohum Sohoni, Ying Xiong, David Fritz, Wira Mulia, and John M. Acken 1 NKS.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

Operating Systems Manage system resources –CPU scheduling –Process management –Memory management –Input/Output device management –Storage device management.
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Mr C Johnston ICT Teacher
 Max Planck Institute for Software Systems Towards trusted cloud computing Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues MPI-SWS.
Security Issues and Challenges in Cloud Computing
Information flow inside the computer IT skills: none IT concepts: computer components (input devices, output devices, memory, storage and CPU), program.
NoHype: Virtualized Cloud Infrastructure without the Virtualization Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby Lee ISCA 2010 Princeton University.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
CS 300 – Lecture 22 Intro to Computer Architecture / Assembly Language Virtual Memory.
Figure 1.1 Interaction between applications and the operating system.
Cs238 Lecture 3 Operating System Structures Dr. Alan R. Davis.
Chapter 2: Impact of Machine Architectures What is the Relationship Between Programs, Programming Languages, and Computers.
Towards Application Security On Untrusted OS
Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
System Software, functions of an operating system
5205 – IT Service Delivery and Support
Windows Server 2008 R2 CSIT 320 (Blum) 1. Server Consolidation – Today’s chips have enhanced capabilities compared to those of the past. In particular.
Self-service Cloud Computing Shakeel Butt Department of Computer Science Rutgers University.
Week 6 Operating Systems.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Chapter 3 Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access.
Chapter 3.1:Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access.
Operating Systems What do you have left on your computer after you strip away all of the games and application programs you bought and installed? Name.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Section 3.1: Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
CS 346 – Chapter 1 Operating system – definition Responsibilities What we find in computer systems Review of –Instruction execution –Compile – link – load.
Computers Operating System Essentials. Operating Systems PROGRAM HARDWARE OPERATING SYSTEM.
G53SEC 1 Reference Monitors Enforcement of Access Control.
SAM-21 Fortress Model and Defense in Depth Some revision on Computer Architecture.
Memory. Chapter 8: Memory Management Background Swapping Contiguous Memory Allocation Paging Structure of the Page Table Segmentation.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
Operating Systems Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security Architecture and Design Chapter 4 Part 1 Pages 297 to 319.
Operating Systems Security
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Security Vulnerabilities in A Virtual Environment
Full and Para Virtualization
DATA COMPROMISE Controlling the flow of sensitive electronic information remains a major challenge, ranging from theft to accidental violation of policies.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Cloud Computing – UNIT - II. VIRTUALIZATION Virtualization Hiding the reality The mantra of smart computing is to intelligently hide the reality Binary->
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
1 OPERATING SYSTEMS. 2 CONTENTS 1.What is an Operating System? 2.OS Functions 3.OS Services 4.Structure of OS 5.Evolution of OS.
Virtual Machine Monitors
Hardware-rooted Trust for Secure Key Management & Transient Trust
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Chapter 1: Introduction
UNIT 19 Data Security 2.
What is an Operating System?
OS Virtualization.
Chapter 27: System Security
Chapter 15, Exploring the Digital Domain
Virtualization Techniques
HC Hyper-V Module GUI Portal VPS Templates Web Console
Multistep Processing of a User Program
User-mode Secret Protection (SP) architecture
Chapter 8: Memory management
Outline Module 1 and 2 dealt with processes, scheduling and synchronization Next two modules will deal with memory and storage Processes require data to.
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
Sai Krishna Deepak Maram, CS 6410
SCONE: Secure Linux Containers Environments with Intel SGX
Presentation transcript:

Information Security and Cloud Computing Naresh K. Sehgal, Sohum Sohoni, Ying Xiong, David Fritz, Wira Mulia, and John M. Acken 1 NKS

Contents Background and Problem Statement Cloud Computing Trends Information Security Background – Internet Security Issues Security Issues with Cloud Computing – Scenarios – Challenges related to Virtualization Future Needs 2 NKS

Background Cloud Computing (CC) refers to – Providing IT Services, Applications and Data – Using dynamically scalable pool(s), – Remotely residing Resources CC provides financial benefits to users and providers CC amplifies Information security issues 3 NKS

Are we there yet? 4 NKS

Problem Statements Access Control – Who can rightfully access a computer system CC shares the same computer between multiple users – May compromise the integrity of run-time programs – How to ensure a timely completion of jobs? – Who is using the EDA license installed in the Cloud? Secure Communications – Data transfer via open channels Large amounts of files transferred over public nodes Large Transfer time will increase customer cost Data Protection in Cloud – Design IP theft Fake login or indirect access Unauthorized access in a 3 rd party data-center – Footprints after the job is done, e.g., erasing tax data on old disk drives – Overdoing the security so it comes in the way of cost & performance 5 NKS

6 Internet Security Levels Access ControlSecure communicationsData protectionMonitoring Software User Application Some login, usually relies on lower levels Usually relies on lower levels of implementation. Encrypt or disguise data Access logs Operating System (OS) LoginIn-memory transactions Special processes as watch dogs Virtual Machine Layer (VM) Hypervisor Layer software drivers from OS Encryption, security handshake encrypt data BIOS/FW based system management layer Privileged execution Privileged access to certain memory locations Log files Hardware CPU from OS Port and buss encryption, secure caches Separate secure registers and memory Memory Cache / Main RAM Encrypted busses, hash checking tables Data encryption Partitioning and encryption Interrupt logs Memory Disk Hash, checking tablesUSB data encryption encrypt disk storage, removable devices Err I/O Verify access id, such as internet IP address Encrypt transmissions, trust keyboard, mouse, and audio. Security handshake, coding, encryption Watch dog processes in hardware and software NKS

77 Internet Security Levels Access ControlSecure communicationsData protectionMonitoring Software User Application Some login, usually relies on lower levels Usually relies on lower levels of implementation. Encrypt or disguise data Access logs Operating System (OS) LoginIn-memory transactions Special processes as watch dogs Virtual Machine Layer (VM) Hypervisor Layer software drivers from OS Encryption, security handshake encrypt data BIOS/FW based system management layer Privileged execution Privileged access to certain memory locations Log files Hardware CPU from OS Port and buss encryption, secure caches Separate secure registers and memory Memory Cache / Main RAM Encrypted busses, hash checking tables Data encryption Partitioning and encryption Interrupt logs Memory Disk Hash, checking tablesUSB data encryption encrypt disk storage, removable devices Err I/O Verify access id, such as internet IP address Encrypt transmissions, trust keyboard, mouse, and audio. Security handshake, coding, encryption Watch dog processes in hardware and software NKS

Information Security Background Traditional Computing Security depends upon Firewalls and Physical Security 8 NKS

Communication Issues between the Islands of Security 9 NKS

Cloud Computing Environment with No central Island of security 10 NKS

Security Issues with Cloud Computing Unauthorized data or program changes (malicious by Mallory and accidental by Randy) Unauthorized observation and copying (intentional eavesdropping by Eve, accidental leaks to Randy) Denial of Service attacks (intentional by Imelda and accidental by Randy) Software User Application Fake login, or indirect access Usually relies on lower levels of implementation. Operating System (OS) Fake login, low level instruction In-memory transactions Virtual Machine Layer (VM) VM to VM communication Information leaks Hypervisor Layer software drivers from OS encryption, security handshake encrypt data BIOS/FW based system management layer Time date stamps Secure memory locations Authentication for execution Hardware CPU Information leaks Memory Cache/main RAM Information leaks Memory Disk Access privileges ?? 11 NKS

Security Issues with Cloud Computing Unauthorized data or program changes (malicious by Mallory and accidental by Randy) Unauthorized observation and copying (intentional eavesdropping by Eve, accidental leaks to Randy) Denial of Service attacks (intentional by Imelda and accidental by Randy) Software User Application Fake login, or indirect access Usually relies on lower levels of implementation. Operating System (OS) Fake login, low level instruction In-memory transactions Virtual Machine Layer (VM) VM to VM communication Information leaks Hypervisor Layer software drivers from OS encryption, security handshake encrypt data BIOS/FW based system management layer Time date stamps Secure memory locations Authentication for execution Hardware CPU Information leaks Memory Cache/main RAM Information leaks Memory Disk Access privileges ?? 12 But at what Cost? 12 NKS

Bottoms up Security inside a Cloud Data-center 13 NKS

Future Research on Security Gaps 1.Trust and confidentiality of consumers’ data 2.Competitors sharing the same disks or servers 3.Accidental or intentional data-trashing activity that can go un-noticed – Regular Integrity checks 4.Cost of security vs. performance 5.Need a holistic approach for end-to-end security 14 Security will drive broader adoption of Cloud Computing NKS