Ragib Hasan Johns Hopkins University en.600.412 Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

Trusted Platform Module
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 3 02/15/2010 Security and Privacy in Cloud Computing.
Vpn-info.com.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 8 04/04/2011 Security and Privacy in Cloud Computing.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 8 04/11/2011 Security and Privacy in Cloud Computing.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
Accountability in Hosted Virtual Networks Eric Keller, Ruby B. Lee, Jennifer Rexford Princeton University VISA 2009.
Slide credits: Ragib Hasan, Johns Hopkins University CS573 Data privacy and security in the cloud.
 Alexandra Constantin  James Cook  Anindya De Computer Science, UC Berkeley.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 1 01/25/2010 Security and Privacy in Cloud Computing.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 10 09/15/2011 Security and Privacy in Cloud Computing.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 11 04/25/2011 Security and Privacy in Cloud Computing.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
 Max Planck Institute for Software Systems Towards trusted cloud computing Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues MPI-SWS.
1 Bootstrapping Trust in a “Trusted” Platform Carnegie Mellon University November 11, 2008 Bryan Parno.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 7 03/29/2010 Security and Privacy in Cloud Computing.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Trusted Disk Loading in the Emulab Network Testbed Cody Cutler, Mike Hibler, Eric Eide, Rob Ricci 1.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 5 03/08/2010 Security and Privacy in Cloud Computing.
Trusted Platform Modules: Building a Trusted Software Stack and Remote Attestation Dane Brandon, Hardeep Uppal CSE551 University of Washington.
PREVENTING CRYPTOGRAPHIC KEY LEAKAGE IN CLOUD VIRTUAL MACHINES STUDENT: FATEMAH ALHARBI PROFESSOR: NAEL ABU-GHAZALEH EE260 SEMINAR IN ELECTRICAL ENGINEERING.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 10 04/18/2011 Security and Privacy in Cloud Computing.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
Authors: Thomas Ristenpart, et at.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2013 Lecture 3 09/03/2013 Security and Privacy in Cloud Computing.
Self-service Cloud Computing Shakeel Butt Department of Computer Science Rutgers University.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 2 02/01/2010 Security and Privacy in Cloud Computing.
Bootstrapping Trust in Commodity Computers Bryan Parno, Jonathan McCune, Adrian Perrig 1 Carnegie Mellon University.
Cloud Computing & Security Issues Prepared by: Hamoud Al-Shammari CS 6910 Summer, 2011 University of Colorado at Colorado Springs Engineering & Applied.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Auditing Cloud Administrators Using Information Flow Tracking Afshar David ACM Scalable Trusted Computing.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 6 03/22/2010 Security and Privacy in Cloud Computing.
Computer Science and Engineering 1 Cloud ComputingSecurity.
SODA Archiving October 2013
Secure Out-of-band Remote Management Using Encrypted Virtual Serial Consoles in IaaS Clouds Kenichi Kourai Tatsuya Kajiwara Kyushu Institute of Technology.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 4 09/10/2013 Security and Privacy in Cloud Computing.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 11 09/27/2011 Security and Privacy in Cloud Computing.
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
Accountability in Hosted Virtual Networks Eric Keller, Ruby B. Lee, Jennifer Rexford Princeton University.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Trusted Infrastructure Xiaolong Wang, Xinming Ou Based on Dr. Andrew Martin’s slides from TIW 2013.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
1 Information Security – Theory vs. Reality , Winter Lecture 12: Trusted computing architecture (cont.), Eran Tromer Slides credit:
Secure Offloading of Legacy IDSes Using Remote VM Introspection in Semi-trusted IaaS Clouds Kenichi Kourai Kazuki Juda Kyushu Institute of Technology.
CMSC 818J: Privacy enhancing technologies Lecture 2.
Mapping/Topology attacks on Virtual Machines
Threat Modeling for Cloud Computing
Trusted Computing and the Trusted Platform Module
Trusted Computing and the Trusted Platform Module
CLOUD COMPUTING Presented By:- EduTechlearners
TERRA Authored by: Garfinkel, Pfaff, Chow, Rosenblum, and Boneh
Assignment #7 – Solutions
Sai Krishna Deepak Maram, CS 6410
Computer Science and Engineering
Bruce Maggs (with some slides from Bryan Parno)
Bruce Maggs (with some slides from Bryan Parno)
Presentation transcript:

Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing

Securing Clouds 2/14/2011en Spring 2011 Lecture 3 | JHU | Ragib Hasan2 Goal: Learn about different techniques for protecting a cloud against insider adversaries Review Assignment #2 Santos et al., Towards Trusted Cloud Computing, HotCloud 2009

Recap From last class: Hey You, Get off of my Cloud. CCS 2009 – Things you liked? – Limitations? – Ideas? 2/14/2011en Spring 2011 Lecture 3 | JHU | Ragib Hasan3

The IaaS security problem 2/14/2011en Spring 2011 Lecture 3 | JHU | Ragib Hasan4 The cloud acts as a big black box, nothing inside the cloud is visible to the clients Clients have no idea or control over what happens inside a cloud Even if the cloud provider is honest, it can have malicious sys admins who can tamper with the VMs and violate confidentiality and integrity

How to ensure that the cloud is not tampered with? Naïve Approach 1: Just trust the cloud provider – Why won’t work: Provider may be honest, sys admins may not be so Naïve Approach 2: As the cloud provider to allow auditing of the cloud by the client – Why won’t work: Providers are not willing to open their system to outside audits Workable Approach 3: Ask cloud provider for unforgeable proof/attestation – Why may work: A third party proof not revealing other information may be enough for both client and provider 2/14/2011en Spring 2011 Lecture 3 | JHU | Ragib Hasan5

How to audit with a third party? Allow third party access to cloud? Use trusted hardware 2/14/2011en Spring 2011 Lecture 3 | JHU | Ragib Hasan6

Trusted Platform Module (TPM) 2/14/2011en Spring 2011 Lecture 3 | JHU | Ragib Hasan7 TPMs are inexpensive chips now included in most laptops Can be the building block for a trusted computing base Can bootstrap trust in a system Endorsement Key: A private (RSA) key that identifies the chip Platform Configuration Register (PCR) : Can contain hashes of system configurations Cannot (easily) be compromised to get the keys

Trusted Cloud Computing Platform by Santos et al., HotCloud 09 2/14/2011en Spring 2011 Lecture 3 | JHU | Ragib Hasan8 Problem Insiders with root access can compromise confidentiality of client virtual machines Possible solution?: Encrypt virtual machines, but sooner or later, it has to be decrypted to run Possible Solution?: Only allow nodes running trustworthy software to decrypt the VM

Threat Model Attacker – A malicious insider with root level access to cloud nodes (i.e., can install new software, modify existing software etc., inspect VMs running on a node) – Does not have physical access to machine 2/14/2011en Spring 2011 Lecture 3 | JHU | Ragib Hasan9

How determine if a node is trustworthy? Major events that causes changes – Node start, VM Launch, VM migration How to determine trustworthiness? – A node is trustworthy if it has a trustworthy configuration (e.g., h/w, software etc.) – Remote attestation can help in verifying configurations 2/14/2011en Spring 2011 Lecture 3 | JHU | Ragib Hasan10

TCCP Architecture Nodes run Trusted Virtual Machine Monitors (TVMM), and TVVM configuration can be certified by TPMs External Trusted Entity (ETE) or the Trusted Coordinator (TC) is the trusted third party that verifies the node 2/14/2011en Spring 2011 Lecture 3 | JHU | Ragib Hasan11

Key ideas Attackers have access to regular cloud nodes But Attackers DO NOT have access to the trusted co-ordinator (TC) 2/14/2011en Spring 2011 Lecture 3 | JHU | Ragib Hasan12

TCCP Protocols 2/14/2011en Spring 2011 Lecture 3 | JHU | Ragib Hasan13 Node registration

TCCP Protocols 2/14/2011en Spring 2011 Lecture 3 | JHU | Ragib Hasan14 VM Launch

TCCP Protocols 2/14/2011en Spring 2011 Lecture 3 | JHU | Ragib Hasan15 VM Migrate

TCCP limitations Any single point of failure? Will it increase the attack surface? How about cost-effectiveness? 2/14/2011en Spring 2011 Lecture 3 | JHU | Ragib Hasan16

2/14/201117en Spring 2011 Lecture 3 | JHU | Ragib Hasan Further Reading TPM Reset Attack Halderman et al., Lest We Remember: Cold Boot Attacks on Encryption Keys, USENIX Security 08,