Download presentation
Presentation is loading. Please wait.
Published byBasil Wade Modified over 9 years ago
1
Self-service Cloud Computing Shakeel Butt Department of Computer Science Rutgers University
2
2 By 2015, 90% of government agencies and large companies will use the cloud [Gartner, “Market Trends: Application Development Software, Worldwide, 2012-2016,” 2012] Many new companies & services rely exclusively on the cloud, e.g., Instagram, MIT/Harvard EdX [NYTimes, “Active in Cloud, Amazon Reshapes Computing,” Aug 28, 2012]
3
Embracing the cloud Lets do Cloud 3
4
Embracing the cloud Trust me with your code & data Cloud ProviderClient You have to trust us as well Cloud operators Problem #1 Client’s data and computation is vulnerable to attacks by malicious cloud operators 4 Cloud Security Alliance (CSA) termed this threat as ‘malicious insider working for Cloud Provider’
5
Embracing the cloud Problem #2 Clients must rely on provider to deploy customized services I need customized malware detection and VM rollback Cloud ProviderClient For now just have checkpointing … Cloud ProviderClient 5
6
Virtualized physical platforms Hardware Hypervisor Management VM (dom0) Work VM Examples: Amazon EC2, Microsoft Azure, OpenStack, RackSpace Hosting 6
7
Hardware Hypervisor Management VM Client’s VM 7 Why do these problems arise?
8
My thesis It is possible to improve security, privacy and control that cloud clients have by modifying the hypervisor’s privilege model 8
9
Hardware SSC Hypervisor Management VM Client’s VM 9 SSC: Self-service cloud computing
10
Hardware SSC Hypervisor Management VM Client’s VM 10 Mutual trust Mutually Trusted VM
11
SSC Control Plane 11 Cloud Infrastructure SSC Hypervisor
12
Contributions Self-service Cloud Computing [CCS’12] –SSC hypervisor –Mutual trust –Six services On the Control Plane of a Self-service Cloud Platform [SoCC’14] –SSC Control Plane –Five Network-based services 12
13
Duties of the management VM Manages and multiplexes hardware resourcesManages client virtual machines 13 Management VM (Dom0)
14
System-wide Mgmt. VM (Sdom0) Per-Client Mgmt. VM (Udom0) Main technique used by SSC Disaggregate the management VM Manages hardware No access to clients VMs Solves problem #1 Manages client’s VMs Allows clients to deploy new services Solves problem #2 14
15
SSC platform Hardware SSC Hypervisor 15 SDom0 Work VM UDom0 Client’s meta-domain Trusted Computing Base
16
UDom0 Checkpoint Storage Rootkit detection UDom0 Client’s Meta-Domain Rootkit detection service VM Storage service VM Checkpoint service VM Work VM 16 Hardware SSC Hypervisor
17
SSC hypervisor Hardware SSC Hypervisor 17 SDom0 Service VM UDom0 Client’s meta-domain Work VM
18
Traditional privilege model Privileged operation Hypervisor Is request from Management VM? YES ALLOW NO DENY 18
19
SSC’s privilege model Privileged operation Self-service hypervisor Is the request from client’s Udom0? NO YES ALLOW Does requestor have privilege (e.g., client’s service VM) DENY NO YES ALLOW 19
20
Bootstrapping Client’s Trust Client requires 1.Correct UDom0 image created 2.Secure communication channel with UDom0 SSC requires 1.Trusted Platform Module (TPM) hardware 2.Trusted Domain Builder 20
21
Trusted Platform Module (TPM) 21 TPM [BIOS, BootLoader, OS, App] BIOS Boot Loader OS Application TPM_Quote(BIOS, BootLoader, OS, App) TPM_Extend(Code)
22
Hardware SSC Hypervisor 22 SDom0 SSC hypervisor Domain Builder UDom0 Equipped with a Trusted Platform Module (TPM) chip Trusted Computing Base
23
23 UDom0 Creation Protocol Domain Builder UDom0.img, Enc TPM (KEY) Domain Builder TPM_Quote UDom0 Domain Builder Create Install (KEY) KEY UDom0 Secure Communication channel using (KEY) Client’s trust established
24
Cloud ProviderClient Conflicting interest SSC puts clients in control of their VMs Sdom0 cannot inspect these VMs Malicious clients can misuse privilege 21 NO data leaks or corruption NO illegal activities or botnet hosting
25
Mutually trusted services (MTS) Hardware SSC Hypervisor 25 SDom0 UDom0 Mutually Trusted Service VM
26
Developing MTS Clients review MTSD code base Restrict I/O channels of MTSD Using third party attester (code verifiers) 26
27
SSC hypervisor Work VM Service VM UDom0 Mutually Trusted Service VM 27 SDom 0 Domain Builder Client’s meta-domain
28
Traditional Cloud Control Plane 28 Customer Node Controller Node Controller Node Controller Cloud Controller Cloud Infrastructure
29
Why new Control Plane for SSC New capabilities provided by SSC –Privileged access –I/O interception Low level management abstraction –i.e. Udom0 29
30
New Capabilities provided by SSC 30 Storage VM Work VM SDom0 Disk Security VM Work VM Monitoring
31
Management abstraction 31 Udom0 1.Complicates management 2.Malicious user
32
SSC Control Plane VM specifications Dashboard VM 32
33
VM specifications Relationship among VMs –Grant_privilege (VM 1, VM 2 ) –Set_backend(VM 1, VM 2, [storage|network]) –Combination of above Examples –Grant_privilege(RootkitVM, WorkVM) –Set_backend(Snort-VM, WorkVM, network)
34
Dashboard-VM acts as Client Web Server App Server App firewall NACL Consolidated View Dashboard VM Cloud Infrastructure 33
35
SSC Control Plane Dashboard VM Cloud Controller Cloud Infrastructure VM specs. VM placement Udom0 34
36
Evaluation Goals –Services –Overhead of SSC Dell PowerEdge R610 –24 GB RAM, 8 cores All VMs (dom0, Sdom0, Udom0, SD) –2 vcpus, 2 GB RAM 36
37
Case studies: Service VMs Storage services –Encryption storage, Integrity checking Network services –NACL, IDS/IPS, VMWall, Network Metering Security services –Memory Introspection, Syscall monitor Checkpointing service Memory deduplication 37
38
Storage encryption service VM Dom0 PlatformUnencrypted (MB/s)Encrypted (MB/s) Xen-legacy81.7271.90 Self-service75.88 (7.1%)70.64 (1.5%) 38 Disk Encryption/ Decryption Work VM Storage VM Work VM Encryption / Decryption SDom0 Disk Set_backend(EncVM, WorkVM, disk)
39
Memory Introspection VM PlatformVM boot time (sec) Xen-legacy6.471 Self-service6.487 (0%) 39 Dom0Work VM Security daemon Security VM Work VM Grant_privilege(SecVM, WorkVM)
40
VMWall – application firewall 40 Work VM VMWall Daemon Memory Introspection PlatformTCP connection setup (μsec) Xen-legacy1014±6 Self-service1688±31 (66%) SDom0 Set_backend(VMWall, WorkVM, net) Grant_privilege(VMWall, WorkVM) Work VM VMWall Memory Introspection Dom0
41
Future work VM placement MTS verification Real world deployment 41
42
Conclusion Self-Service Cloud (SSC) computing –protects client’s integrity and confidentiality –provides flexible control to clients Mutual trust SSC Control Plane Service VMs 42 Questions? shakeelb@cs.rutgers.edu
43
43
44
Self-service model assurances Protects client’s integrity and confidentiality Flexibility to implement new services BUT NO –Vulnerabilities in client’s VM –Availability or Denial of Service –Protection against hardware attacks –Protection against side channel attacks 35
45
VM Allocation Dashboard VM Cloud Controller Cloud Provider’s Infrastructure VM placement Sdom0 Grant_privilege (SecVM,VM)
46
VM Allocation 46 Hardware Security VM Self-service hypervisor Sdom0 Client’s VM Dashboard VM Udom0 1.Create Client controller (Udom0) 2.Create Security-VM and Work-VM
47
Examples specs Rootkit detector –Grant_privilege(RootkitVM, WorkVM) NIDS –Set_backend(Snort-VM, WorkVM, network) VMWall –Privilege_over (VMWall-VM, WorkVM) –Set_backend(VMWall-VM, WorkVM, network) 47
48
VM migration in SSC Hardware Service VM Self-service hypervisor client Management VM Client’s VM Hardware Service VM Self-service hypervisor client Management VM Client’s VM
49
VM migration Hardware Service VM Self-service hypervisor client Management VM Client’s VM Dashboard VM Cloud Controller Hardware Service VM Self-service hypervisor client Management VM Client’s VM VM migrate
50
VM Migration internals 50 Migrate(VM) Iterative Push (VM) Stop-and-copy(VM) Done Resume destination(VM)
51
Concurrent VM Migration 51 Migrate(VM 1 ) Stop-and-copy(VM 1 ) Done Resume destination( VM 1 ) Stop-and-copy(VM 2 ) Done Resume destination( VM 2 ) SYNC Iterative Push (VM 1 ) Migrate(VM 2 ) Iterative Push (VM 2 ) SYNC
52
Cloud infrastructure 52 Customer Cloud Controller Sdom0 Udom0
53
SSC usage model Cloud Provider’s Infrastructure Physical Machine Physical Machine Hardware Service VM Self-service hypervisor client Management VM Client’s VM
54
Client’s VMs on multiple machines Cloud Provider’s Infrastructure Physical Machine Physical Machine Hardware Service VM Self-service hypervisor client Management VM Client’s VM Hardware Service VM Self-service hypervisor client Management VM Client’s VM
55
Provider’s infrastructure exposure Cloud Provider’s Infrastructure Physical Machine Physical Machine Physical Machine
56
VM specifications Relationship among VMs –Grant_privilege (VM 1, VM 2 ) –Set_backend(VM 1, VM 2, [storage|network]) –Combination of above Co-location dependencies (for Cloud Controller) Ordering (for Dashboard-VM) –Allocation, Deallocation, Migration
57
Cloud Management Platform Cloud Controller Cloud Provider’s Infrastructure Node Controller
58
58
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.