11 World-Leading Research with Real-World Impact! A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service Khalid Zaman Bijon, Ram.

Slides:



Advertisements
Similar presentations
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Advertisements

1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University.
11 World-Leading Research with Real-World Impact! A Framework for Risk-Aware Role Based Access Control Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu.
Institute for Cyber Security
11 World-Leading Research with Real-World Impact! A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders Khalid Zaman Bijon, Tahmina.
2  Industry trends and challenges  Windows Server 2012: Beyond virtualization  Complete virtualization platform  Improved scalability and performance.
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Lakshmi Narayana Gupta Kollepara 10/26/2009 CSC-8320.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Secure Cyber Incident Information Sharing UTSA Team Leads Dr. Ram Krishnan, Assistant Professor, ECE Dr. Ravi Sandhu, Executive Director, ICS April 30,
1 Risk-Aware Role and Attribute Based Access Control Models Khalid Zaman Bijon World-Leading Research with Real-World Impact! Institute for Cyber Security.
1 A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC Prof. Ravi Sandhu Executive Director and Endowed Chair DBSEC July 11, 2012.
Institute for Cyber Security Extending OpenStack Access Control with Domain Trust World-Leading Research with Real-World Impact! 1 Bo Tang and Ravi Sandhu.
Attribute-Based Access Control Models and Beyond
11 World-Leading Research with Real-World Impact! Constraints Specification for Virtual Resource Orchestration in Cloud IaaS Constraints Specification.
“It’s going to take a month to get a proof of concept going.” “I know VMM, but don’t know how it works with SPF and the Portal” “I know Azure, but.
11 World-Leading Research with Real-World Impact! RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman.
FI-WARE – Future Internet Core Platform FI-WARE Cloud Hosting July 2011 High-level description.
Service Management API Management Portal Service Provider Foundation SPF Web Server Stamp2 SPF DB VMM Server 2 Stamp1 VMM Server 1 Stamp scale.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
Secure Information and Resource Sharing in CloudSecure Information and Resource Sharing in Cloud References OSAC-SID Model [1]K. Harrison and G. White.
System Center 2012 Setup The components of system center App Controller Data Protection Manager Operations Manager Orchestrator Service.
1 A Role Based Administration Model For Attribute Xin Jin, Ram Krishnan, Ravi Sandhu SRAS, Sep 19, 2012 World-Leading Research with Real-World Impact!
1 World-Leading Research with Real-World Impact! Authorization Federation in IaaS Multi Cloud Navid Pustchi, Ram Krishnan and Ravi Sandhu SCC 2015.
11 World-Leading Research with Real-World Impact! A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems Khalid Zaman Bijon,
Auditing Cloud Administrators Using Information Flow Tracking Afshar David ACM Scalable Trusted Computing.
Institute for Cyber Security A Multi-Tenant RBAC Model for Collaborative Cloud Services Bo Tang, Qi Li and Ravi Sandhu Presented by Bo Tang at The 11 th.
UTSA Amy(Yun) Zhang, Ram Krishnan, Ravi Sandhu Institute for Cyber Security University of Texas at San Antonio San Antonio, TX Nov 03, 2014 Presented.
11 World-Leading Research with Real-World Impact! Towards Provenance and Risk-Awareness in Social Computing Yuan Cheng, Dang Nguyen, Khalid Bijon, Ram.
Secure Cyber Incident Information Sharing UTSA Team Leads Dr. Ram Krishnan, Assistant Professor, ECE Dr. Ravi Sandhu, Professor (CS) and Executive Director.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
Microsoft Virtual Academy.
Institute for Cyber Security Cross-Tenant Trust Models in Cloud Computing Bo Tang and Ravi Sandhu IRI Aug 14-16, 2013 San Francisco, CA © ICS at UTSA World-Leading.
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
11 World-Leading Research with Real-World Impact! Risk-Aware RBAC Sessions Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu Institute for Cyber Security.
11 World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing: A Lattice Interpretation Institute for Cyber Security Ravi.
Institute for Cyber Security Multi-Tenancy Authorization Models for Collaborative Cloud Services Bo Tang, Ravi Sandhu, and Qi Li Presented by Bo Tang ©
1 RABAC : Role-Centric Attribute-Based Access Control MMM-ACNS 2012 Xin Jin, Ravi Sandhu, Ram Krishnan University of Texas at San Antonio San Antonio,
Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships Sep. 3, 2012 PASSAT 2012, Amsterdam, The Netherlands Yuan.
SC2012 Infrastructure Components Management Justin Cook (Data # 3) Principal Consultant, Systems Management Noel Fairclough (Data # 3) Consultant, Systems.
INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate,
Model Checking Grid Policies JeeHyun Hwang, Mine Altunay, Tao Xie, Vincent Hu Presenter: tanya levshina International Symposium on Grid Computing (ISGC.
Security Vulnerabilities in A Virtual Environment
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
CSC 8320 Advanced Operating System Discretionary Access Control Models Presenter: Ke Gao Instructor: Professor Zhang.
Vignesh Ravindran Sankarbala Manoharan. Infrastructure As A Service (IAAS) is a model that is used to deliver a platform virtualization environment with.
Microsoft Virtual Academy Module 12 Managing Services with VMM and App Controller.
| Basel Fabric Management with Virtual Machine Manager Philipp Witschi – Cloud Architect & Microsoft vTSP Thomas Maurer – Cloud Architect & Microsoft MVP.
1 Authorization Federation in Multi-Tenant Multi-Cloud IaaS Navid Pustchi Advisor: Prof. Ravi Sandhu.
Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support Yuan Cheng 1 , 2, Khalid Bijon 2, and Ravi Sandhu 1 Institute for.
Object-to-Object Relationship Based Access Control: Model and Multi-Cloud Demonstration Tahmina Ahmed, Farhan Patwa and Ravi Sandhu Department of Computer.
1 Cyber Security Major R&D Challenges Ram Krishnan Cyber Security Research Institute (CSRI) Cyber Security R&D Workshop.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Windows 2012R2 Hyper-V and System Center 2012
Chapter 6: Securing the Cloud
Institute for Cyber Security
Institute for Cyber Security
Institute for Cyber Security
Institute for Cyber Security
Federated IdM Across Heterogeneous Clouding Environment
World-Leading Research with Real-World Impact!
CompTIA Security+ Study Guide (SY0-401)
Managing Clouds with VMM
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Managing Services with VMM and App Controller
Presentation transcript:

11 World-Leading Research with Real-World Impact! A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu Institute for Cyber Security University of Texas at San Antonio October 15-17, 2014 NSS 2014: The 8th International Conference on Network and System Security Institute for Cyber Security

 A IaaS cloud service provider offers  A number of heterogeneous virtual resources, e.g., virtual machines, virtual networks, etc.  To a large number of clients, also referred as tenants.  Management of these virtual resources is very complex  Cloud datacenter may contain thousands of virtual resources from hundreds of tenants.  Different configurations requirements from different tenants.  Management proper sharing of physical resources among different virtual resources across tenants (multi-tenancy).  The challenge is to develop proper mechanism to manage isolation of the virtual resources across tenants. 2 World-Leading Research with Real-World Impact! Intro. & Motivation

 Recently, trusted virtual datacenter (TVDc)[1] is proposed to manage isolation in cloud IaaS  By defining trusted virtual domains (TVDs) where each TVD is assigned to virtual machines and its associated virtual resources such as virtual networks, virtual storages, etc. that serve a common purpose.  A TVD identifier is represented as a security clearance (also referred as a color).  Here, for example, a color can represent the virtual resources of a particular tenant.  Therefore, in TVDc, virtual resources with same color are viewed as single and disjoint computing resources. 3 [1] S. Berger et al. Security for the cloud infrastructure: Trusted virtual data center implementation. IBM Journal of R&D, 53(4):6{1, Background

 TVDc provide mechanism for isolating administrative user privileges  Proposed three different administrative roles for performing three different jobs in cloud: IT datacenter administrator, TVDc administrator, and tenant administrator.  IT datacenter administrator  A user having this role is a superuser in the system.  Discover virtual resources and grouped as different trusted virtual datacenters (TVDc) groups.  Assign a TVDc group to each user having TVDc or tenant administrator role.  Create colors and assign colors to each user having TVDc administrator role.  TVDc administrator  Assign colors to virtual resources in their TVDc groups.  Assign colors to users having tenant administrator role and belongs to same TVDc groups.  Tenant administrator  perform basic cloud administrative operations, such as connect vm to a virtual network, if the resources have same color. 4 World-Leading Research with Real-World Impact! Background (cont.)

 TVDc supports following four types of isolations:  Data Sharing  A VM Only can share data with another VM with same color.  VMs are allowed to connect to a VLAN only if both VMs and the VLAN have common colors.  Hypervisor (host) Authorization  A host is assigned a set of colors.  Only allowed to run vms having a color belong to that set.  Co-location Management  Certain colors can be declared as conflicting with each other.  Constraints VMs to run in same host that are assigned conflicting colors.  Management Constraints  Tenant Administrator role.  Each user having this role only perform operation within his assigned color. 5 World-Leading Research with Real-World Impact! Isolations

 Develop a formal model for TVDc which we call Formalized-TVDc (also referred as F-TVDc)  Leverage an Attribute based system to represent different properties of the virtual resources, such as color and TVDc groups  Consists authorization model for three type of administrative users  Enforcement mechanism for the co-location constraints 6 World-Leading Research with Real-World Impact! Proposed Model

 F-TVDc contains following sets of the basic components:  CLR = Finite set of existing colors  VDc = Finite set of existing virtual data centers  AROLE = {itAdmin, tvdcAdmin, tntAdmin}  AU = Finite set of existing admin-users  VM = Finite set of existing virtual machines  VMM = Finite set of existing hypervisors  BR = Finite set of existing virtual bridges  VLAN = Finite set of existing virtual LANs  Admin-users and virtual resources have different attributes:  Attributes are name:value pairs  Can be set valued or atomic valued  Characterize different properties of the element 7 World-Leading Research with Real-World Impact! Formalized-TVDc

8 World-Leading Research with Real-World Impact! Attributes

 F-TVDc formally specifies operations for the admin- users with three different roles  Operations for admin-users with itAdmin role  CreateVDC: This operation creates a virtual datacenter,  CreateCl and RemoveCl: Using these two operations, an admin-user with itAdmin role create a new color cl and remove an existing color cl.  Add_Cl TVDcAdmin : This operation adds a clearance to an admin-user having tvdcAdmin role.  Rem_Cl TVDcAdmin : Using this operation, an itAdmin removes a color cl from an admin- user having role tvdcAdmin.  Assign_VDC Admin :This operation assign a virtual datacenter identifier to an admin- user having tvdcAdmin or tenantAdmin role.  Similarly, Assign_VDC VM, Assign_VDC VMM, Assign_VDC VLAN, and Assign_VDC BR assign a virtual datacenter identifier to respective virtual resource.  All these operations are only authorized for admin-users who have itAdmin assigned to their adminRole attribute 9 World-Leading Research with Real-World Impact! Administrative Models

Operations for admin-users with tvdcAdmin role:  Assign_Cl TAdmin : This operation adds a clearance to an admin-user having tenantAdmin role. The tvdcAdmin can only add a clearance to a tenantAdmin if they are in same virtual datacenter which is assigned to their adminvdcenter attribute.  RM_Cl TAdmin : This operation removes a clearance from an admin-user having tenantAdmin role. The tvdcAdmin can only remove a clearance to a tenantAdmin if they are in same virtual datacenter which is assigned to their adminvdcenter attribute.  Similarly, Assign_Cl VM, Assign_Cl VMM, Assign_Cl VLAN, and Assign_Cl BR assign a virtual datacenter identifier to respective virtual resource by a admin- user having tvdcAdmin role and they are in same virtual datacenter. 10 World-Leading Research with Real-World Impact! Administrative Models (cont.)

Operations for admin-users with tenantAdmin role:  Boot: Using this operation a tenant admin-user u boots a VM vm in a Host vmm. 1. The precondition of this operation veries if the u has same color of the vm. This ensures management isolation constraint. 2. It also varifies if both VM (vm) and Host (vmm) has same color which ensures host authorization isolation.  ConVmToBr and ConBrToVLAN: These operations connect a vm to a virtual bridge br and a bridge to a virtual LAN respectively. 1. A vm can be connected to a virtual bridge if they have same color. 2. A virtual bridge can be connected to a VLAN if they have same color. 3. This approach ensures data isolation constraint. 11 World-Leading Research with Real-World Impact! Administrative Models (cont.)

 Co-location Constraints Verification  Verified during each boot operation  Evaluate_CLocConst method is called  Some colors are specified as conflicted in a set called ConflictColor  VMs with conflicted color in same Host  Ensures co-location isolation of VMs 12 World-Leading Research with Real-World Impact! Administrative Models (cont.)

Formally represents an isolation management process of virtual resources in cloud IaaS.  Develop an attribute based system  Identified administrative operations in cloud IaaS  Develop a mechanism to handle co-location issues in multi- tenant scenarios Future Work  Identify conflicts among various attributes, e.g., tenant, performance, of virtual machines  Suitable virtual machine scheduler when there are conflicts 13 World-Leading Research with Real-World Impact! Conclusion