Auditing Cloud Administrators Using Information Flow Tracking Afshar David ACM Scalable Trusted Computing.

Slides:



Advertisements
Similar presentations
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Advertisements

Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing.
Managing NymBoxes for Identity and Tracking Protection David Wolinsky, Daniel Jackowitz, and Bryan Ford Yale University.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
© 2011 VMware Inc. All rights reserved Confidential VMware’s Journey to the Cloud: Leveraging Hyperic for Portal Infrastructure Monitoring March 2012.
Xen , Linux Vserver , Planet Lab
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
 Max Planck Institute for Software Systems Towards trusted cloud computing Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues MPI-SWS.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 5 03/08/2010 Security and Privacy in Cloud Computing.
WLCG Cloud Traceability Working Group progress Ian Collier Pre-GDB Amsterdam 10th March 2015.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
Virtualization for Cloud Computing
Secure Information and Resource Sharing in CloudSecure Information and Resource Sharing in Cloud References OSAC-SID Model [1]K. Harrison and G. White.
ADVANCED LINUX SECURITY. Abstract : Using mandatory access control greatly increases the security of an operating system. SELinux, which is an implementation.
5205 – IT Service Delivery and Support
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Module 8: Implementing Administrative Templates and Audit Policy.
Privacy By Design Sample Use Case Privacy Controls Insurance Application- Vehicle Data.
Minerva Infrastructure Meeting – October 04, 2011.
11 World-Leading Research with Real-World Impact! A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service Khalid Zaman Bijon, Ram.
Unsafe Exposure Analysis of Mobile In-App Advertisements Offense: Rachel Stonehirsch.
System Center 2012 Setup The components of system center App Controller Data Protection Manager Operations Manager Orchestrator Service.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
WP6: Grid Authorization Service Review meeting in Berlin, March 8 th 2004 Marcin Adamski Michał Chmielewski Sergiusz Fonrobert Jarek Nabrzyski Tomasz Nowocień.
Peter R. Pietzuch Ioannis Papagiannis Peter Pietzuch Large-Scale Distributed Systems Group ACM Cloud Computing.
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Department of Computer Science Engineering SRM University
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
Jakub Szefer, Eric Keller, Ruby B. Lee Jennifer Rexford Princeton University CCS October, 2011 報告人:張逸文.
Module 14: Configuring Print Resources and Printing Pools.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 2.
Module 7: Fundamentals of Administering Windows Server 2008.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
服务计算技术与系统教育部重点实验室 (SCTS) 集群与网格计算湖北省重点实验室 (CGCL) CFCC: Covert Flows Confinement For VM Coalitions Ge Cheng, Hai Jin, Deqing Zou, Lei Shi, and Alex K. Ohoussou.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
A Framework For User Feedback Based Cloud Service Monitoring
Large Scale Sky Computing Applications with Nimbus Pierre Riteau Université de Rennes 1, IRISA INRIA Rennes – Bretagne Atlantique Rennes, France
COMS E Cloud Computing and Data Center Networking Sambit Sahu
Magellan: Experiences from a Science Cloud Lavanya Ramakrishnan.
Database Administrator RAL Proposed Workshop Goals Dirk Duellmann, CERN.
Module 5: Implementing Group Policy
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Self-service Cloud Computing Presented by: Yu Bai (ybai181) Butt, S., Lagar-Cavilla, H. A., Srivastava, A., & Ganapathy, V. (2012, October). Self-service.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Self-service Cloud Computing by Jack Luo Shakeel Butt (Rugtgers University) H.Andres Lagar-Cavilla (GridCentric Inc.) Abhinav Srivastava (AT&T Labs-Research)
Improving Xen Security through Disaggregation Derek MurrayGrzegorz MilosSteven Hand.
Operating Systems Concepts 1/e Ruth Watson Chapter 8 Chapter 8 Network Administrator Ruth Watson.
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
Scalability Requirements and Implementation Options.
DATA COMPROMISE Controlling the flow of sensitive electronic information remains a major challenge, ranging from theft to accidental violation of policies.
Module 10: Implementing Administrative Templates and Audit Policy.
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Securing Distributed Systems with Information Flow Control.
Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Security aspects.
1 Chapter Overview Understanding Shared Folders Planning, Sharing, and Connecting to Shared Folders Combining Shared Folder Permissions and NTFS Permissions.
01/27/10 What is PlanetLab? A planet-wide testbed for the R & D of network applications and distributed computing Over 1068 nodes at 493 sites, primarily.
CSc 8320 Advanced Operating Systems Chapter 8 Distributed Computer Security 8.1 Fundamentals of Computer Security FALL 2013 Instructor: Prof. Yanqing Zhang.
Secure Offloading of Legacy IDSes Using Remote VM Introspection in Semi-trusted IaaS Clouds Kenichi Kourai Kazuki Juda Kyushu Institute of Technology.
Linux Systems Administration 101 National Computer Institute Sep
Efficient Multi-User Indexing for Secure Keyword Search
THE STEPS TO MANAGE THE GRID
Open source Cloud Management Platforms
06 | SQL Server and the Cloud
Presentation transcript:

Auditing Cloud Administrators Using Information Flow Tracking Afshar David ACM Scalable Trusted Computing Workshop Raleigh, North Carolina October 2012

Cloud Computing Is Not Trusted 2

Admins at Infrastructure-as-a-Service (IaaS) Providers 3 VMM User VM Management Stack

Restricting Admins Is Not the Solution 4 VMM User VM Management Stack I cannot: Install commodity applications I want. Change system configurations. Write my own scripts in Perl or Python. Monitor resource usages. See the logs for troubleshooting.

H-one Provides Logs for Auditing 5 We propose auditing.  H-one performs no access control. Auditing has been used in other domains. Auditing deters misbehaving. Helps to assign liability of events. No unnecessary restrictions for admins. Auditing has 2 stages:  Generating logs  Inspecting the logs

What are the logging challenges in H-one? 6 GOALS Complete Effici ent Privacy Preserving Data: From VMs to Admins From Admins to VMs Minimal Storage Costs Logs related to different customers should be separate. To achieve these goals H-one uses Information Flow Tracking

Example 1: Benign Admin Tasks: VM Backup 7 VMM User VMManagement Stack Disk Kernel User Disk Image H-one Module

Example 2: Benign Admin Tasks: Backup for 2 VMs 8 VMM User VM 2User VM 1Management Stack Disk Kernel Disk 1 Disk 2 H-one Module

Example 3: Adversarial Admin 9 VMM User VMManagement Stack Disk Kernel User Disk Image H-one Module

Using Information Flow Tracking 10 GOALS Complete Effici ent Privacy Preserving H-one tracks any data flow inside management stack. By following information flows, just the required data at appropriate points get logged. Tracking flows lets us know leaked data belong to which user.

 We use Xen hypervisor for our prototype.  We use a customized LSM module for labeling and tracking information flows protecting the integrity of the H-one logging system  We use the concept of the “exporter” processes similar to DStar paper for tracking networking communications. N. Zeldovich, S. Boyd-Wickizer, and D. Mazieres, “Securing Distributed Systems with Information Flow Control,” in Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2008, pp. 293–308. Implementation 11

 Information Flow Tracking reduces the logging cost.  Our filtering daemon can further reduce the log size in specific scenarios based on the context.  Filtering daemon understands the legitimate flows of information and filters the corresponding logs. Realtime Filtering of Logs 12

13 Questions ?! Discussion ?!

Label Propagation 14

15 Questions ?! Discussion ?!