Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) October 2010 Secure Cloud Computing and Cloud Forensics.

Slides:



Advertisements
Similar presentations
Virtual Machine Technology Dr. Gregor von Laszewski Dr. Lizhe Wang.
Advertisements

Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Clouds C. Vuerli Contributed by Zsolt Nemeth. As it started.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Cloud SUT proposal OSGcloud group. Objective To fill in the Research the group about the thinking within the OSG working group To solicit new ideas/proposals.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) October 2011 Cloud-based Assured Information Sharing and Identity Management.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
Virtualization and the Cloud
Cloud Usability Framework
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
Be Smart, Use PwrSmart What Is The Cloud?. Where Did The Cloud Come From? We get the term “Cloud” from the early days of the internet where we drew a.
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Virtualization for Cloud Computing
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Secure Data Storage and Retrieval in the Cloud Bhavani Thuraisingham,
5205 – IT Service Delivery and Support
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Cloud computing Tahani aljehani.
Discussion on LI for Mobile Clouds
Plan Introduction What is Cloud Computing?
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2013 Assured Cloud Computing.
Cloud Computing in Large Scale Projects George Bourmas Sales Consulting Manager Database & Options.
Effectively and Securely Using the Cloud Computing Paradigm.
Clouds on IT horizon Faculty of Maritime Studies University of Rijeka Sanja Mohorovičić INFuture 2009, Zagreb, 5 November 2009.
CLOUD COMPUTING & COST MANAGEMENT S. Gurubalasubramaniyan, MSc IT, MTech Presented by.
Introduction to Cloud Computing
VIRTUALIZATION AND CLOUD COMPUTING Dr. John P. Abraham Professor, Computer Engineering UTPA.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
Ch 4. The Evolution of Analytic Scalability
A Brief Overview by Aditya Dutt March 18 th ’ Aditya Inc.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Computer Science and Engineering 1 Cloud ComputingSecurity.
The Legal Issues Facing Digital Forensic Investigations In A Cloud Environment Presented by Janice Rafraf 15/05/2015Janice Rafraf1.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
PaaSport Introduction on Cloud Computing PaaSport training material.
Security Vulnerabilities in A Virtual Environment
Full and Para Virtualization
Chapter 8 – Cloud Computing
Cloud computing Cloud Computing1. NIST: Five essential characteristics On-demand self-service Computing capabilities, disks are demanded over the network.
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
Web Technologies Lecture 13 Introduction to cloud computing.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 2013 Cloud Computing for Assured Information Sharing.
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Private KEEP OFF! Private KEEP OFF! Open! What is a cloud? Cloud computing is a model for enabling convenient, on-demand network access to a shared.
CLOUD COMPUTING Presented to Graduate Students Mechanical Engineering Dr. John P. Abraham Professor, Computer Engineering UTPA.
CS 6027 Advanced Networking FINAL PROJECT ​. Cloud Computing KRANTHI ​ CHENNUPATI PRANEETHA VARIGONDA ​ SANGEETHA LAXMAN ​ VARUN ​ DENDUKURI.
Chapter 6: Securing the Cloud
StratusLab Final Periodic Review
StratusLab Final Periodic Review
Cloud Computing Kelley Raines.
Introduction to Cloud Computing
Cloud Computing.
Assured Cloud Computing for Assured Information Sharing
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Data Security for Microsoft Azure
Secure Cloud Computing and Cloud Forensics
Cloud Computing: Concepts
Computer Science and Engineering
Presentation transcript:

Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) October 2010 Secure Cloud Computing and Cloud Forensics

Cloud Computing: NIST Definition Cloud computing is a pay-per-use model for enabling available, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is comprised of five key characteristics, three delivery models, and four deployment models. Key Characteristics: On-demand self-service, Location independent resource pooling. Rapid elasticity, Pay per use. Delivery Models: Cloud Software as a Service (SaaS), Cloud Platform as a Service (PaaS), Cloud Infrastructure as a Service (IaaS). Deployment Models: Private cloud, Community cloud, Public cloud. Hybrid cloud. Our goal is to demonstrate policy based assured information sharing on clouds

Security Challenges for Clouds Policy – Access Control and Accountability Data Security and Privacy Issues – Third party publication of data; Security challenges associated with data outsourcing; – Data at the different sites have to be protected, with the end results being made available; querying encrypted data – Secure Query Processing/Updates in Cloud Secure Storage Security Related to Virtualization Cloud Monitoring Protocol and Network Security for Clouds Identity Management Cloud Forensics

8/10/20154 Layered Framework Application (Law Enforcement) Hadoop/MapReduc/Storage HIVE/SPARQL/Query XEN/Linux/VMM Secure Virtual Network Monitor Policies XACML Risks/ Costs QoS Resource Allocation Cloud Monitors Figure.2 Layered Framework for Assured Cloud Approach: Study the problem with current principles and technologies and then develop principles for secure cloud computing

Secure Query Processing with Hadoop/MapReduce We have studied Clouds based on Hadoop Query Rewriting and Optimization Principles defined and implemented for two types of data (i) Relational data: Secure query processing with HIVE (ii) RDF Data: Secure query processing with SPARQL Demonstrated with XACML Policies (content, temporal, association) Joint demonstration with Kings College and University of Insubria – First demo (2010): Each party submits their data and policies – Our cloud will manage the data and policies – Second demo (2011): Multiple clouds

Principles of Secure Query Optimization Query optimization principles defined and strategies implemented in the 1970s and 1980s for relational data (IBM System R and DB2 Ingres) – Query Rewriting, Query Evaluation Procedures, Search strategy, Cost functions Secure query optimization principles defined and strategies implemented in the 1980s and 1990s (Honeywell, MITRE) Extended secure query optimization for cloud environment – Query optimization for RDF data – Secure query optimization for RDF data – Secure query optimization for RDF data in a cloud environment

Hive is a data warehouse infrastructure built on top of Hadoop that provides tools to enable easy data summarization, adhoc querying and analysis of large datasets data stored in Hadoop files. It provides a mechanism to put structure on this data and it also provides a simple query language called Hive QL which is based on SQL and which enables users familiar with SQL to query this data  Policies include content dependent access control, association based access control, time-dependent access control  Table/View definition and loading,  Users can create tables as well as load data into tables. Further, they can also upload XACML policies for the table they are creating. Users can also create XACML policies for tables/views.  Users can define views only if they have permissions for all tables specified in the query used to create the view. They can also either specify or create XACML policies for the views they are defining. Fine-grained Access Control with Hive

System Architecture

SPARQL Query Optimizer for Secure RDF Data Processing Developed a secure query optimizer and query rewriter for RDF Data with XACML policies and implemented on top of JENA Storage Support – Built a storage mechanism for very large RDF graphs for JENA – Integrated the system with Hadoop for the storage of large amounts of RDF data (e.g. a billion triples) – Need to incorporate secure storage strategies developed in FY09

Server Backend System Architecture Web Interface Data Preprocessor N-Triples Converter Prefix Generator Predicate Based Splitter Predicate Object Based Splitter MapReduce Framework Parser Query Validator & Rewriter XACML PDP Plan Generator Plan Executor Query Rewriter By Policy New Data Query Answer

Security for AMAZON S3 Many organizations are using cloud services like Amazon S3 for data storage. A few important questions arise here – –Can we use S3 to store the data sources used by Blackbook?; Is the data we store on S3, secure? Is it accessible by any user outside our organization? ; How do we restrict access to files to the users within the organization? –BLACKBOOK is a semantic-web based tool used by analysts within the Intelligence Community. The tool federates queries across data sources. These data sources are databases or applications located either locally or remotely on the network. BLACKBOOK allows analysts to make logical inferences across the data sources, add their own knowledge and share that knowledge with other analysts using the system. We use Amazon S3 to store the data sources used by Blackbook. To keep our data secure, we encrypt the data using AES (Advanced Encryption Standard) before uploading the data files on Amazon S3. To restrict access to the files to the users within the organization, we implemented RBAC policies using XACML

XACML Design Implementation in Hadoop Until July 2010, little security in Hadoop We have designed XACML for Hadoop Use of In-line Reference Monitor Concept is being explored Examining current Hadoop security (released July 2010 and will complete XACML implementation December 2010) Also examining accountability for Hadoop (with Purdue)

Secure VMM: Xen Architecture Xen Hypervisor – The hypervisor runs just on top of the hardware and traps all calls by VMs to access the hardware. Domain 0 (Dom0): Domain 0 is a modified version of Linux that is used to manage the other VMs. Domain U (DomU): Domain U is the user domain in Xen. DomU is where all of the untrusted guest OSs reside.

Virtual Machines DomU is broken into two parts Para-Virtualized Domains (PV) and Hardware Assisted Virtualized Domains (HVM) Para-virtualized Domain (PV): A Para-virtualized domain is a modified operating system that is aware that it is a virtual machine. Can achieve near native performance. Hardware Assisted Virtualized Machine Domain (HVM) – HVMs are VMs that run operating systems that have not been modified to work with Dom0. This allows closed source operating systems like Windows. Memory: PVs are given Read-Only access to memory and any updates are controlled by the hypervisor. HVMs are given a shadow page table because they do not know how to work with non-contiguous physical address spaces. I/O Management: I/O Management is controlled by Dom0. PVs share memory with Dom0 through which they can pass messages with it. Dom0 runs the Qemu deamon to emulate the devices for the HVMs

Security Issues Access Control – At the moment access control is discretionary. Fine- grained multilevel controls are needed (Integrity Lock architecture) Secure Boot – The boot process needs to be secured. Proper attestation methods need to be developed. Component Isolation – Dom0 supports networking, disk I/O, VM boot loading, hardware emulation, workload balancing, etc. Dom0 needs to be decomposed into components Logging – More robust logging is needed to develop a clear view of the chain of events. Introspection – Introspection is a security technique where a virtual machine running security software is allowed to look inside the memory of another VM. Software such as IPSs and antriviruses, using introspection should be safe from tampering if the monitored VM is exploited.

Overall Architecture of Accountable Grid Systems (Purdue) * Accountability agents * Strategies for accountability data collection * Exchange of information among accountability agents to generate alarms

Data Collection Approaches Job-flow based approach Jobs flow across different organizational units Long computations are often divided into many sub-jobs to be run in parallel A possible approach is to employ point-to point agents which collect data at each node that the job traverses Grid node based approach It focuses on a given location in the flow and at a given instant of time for all jobs Viewpoint is fixed The combination of two approaches allows us to collect complementary information

Detection at the victim node (e.g., gatekeeper, head node) From the data obtained in grid-node based strategy, the agent detects anomalies concerning resource consumption by using methodologies such as statistical modeling, entropy based approaches However such approaches are often not accurate, and result in high rate of false detection By using data concerning job’s flow collected in job-flow based strategy, agents cooperate in three alarms (light, moderate, and critical) to further detect attacks Upon receiving a critical alarm, the agent takes proper actions such as increasing the priority of jobs identified as legal or killing malicious jobs including jobs that may potentially perform bad operations.

Cloud Forensics (Kyun Ruan, University College Dublin) Forensic Readiness – General Forensic Readiness; Synchronization of Data; Location Anonymity; Identity Management; Encryption and Key Management; Log Format Challenges Unique to Cloud – Multi-tenancy and Resource Sharing; Multiple Jurisdictions; Electronic Discovery Challenges Exacerbated by the Cloud – The Velocity of Attack Factor; Malicious Insider; Data Deletion; Hypervisor-level Investigation; Proliferation of Endpoints Opportunities with Cloud – Cost-effectiveness; Robustness; Scalability and Flexibility; Forensics as a Cloud Service; Standards and Policies

Current and Future Research Secure VMM (Virtual Machine Monitor) – Exploring XEN VMM and examining security issues Demonstration using the Secure Cloud with North Central Texas Fusion System Data (with ADB Consulting) Coalition demonstration (with London and Italy) Integrate Secure Storage Algorithms into the Storage System Developed (2011) Identity Management (2011 with Purdue) Secure Virtual Network Monitor (Future, 2012) Cloud Forensics

Education Program We offer a course in Cloud computing (Industry adjunct professor; Spring 2009) Course planned for Spring 2012 that incorporate the research results (Building and Securing the Cloud) – Topics covered will include technologies, techniques, tools and trends