Secure Cloud Computing with a Virtualized Network Infrastructure



Similar documents
Secure Cloud Computing with a Virtualized Network Infrastructure

Lecture 02b Cloud Computing II

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Expert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts

Outline. Why Neutron? What is Neutron? API Abstractions Plugin Architecture

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

VXLAN: Scaling Data Center Capacity. White Paper

Data Center Network Virtualisation Standards. Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair

Network performance in virtual infrastructures

Network Virtualization

Extending Networking to Fit the Cloud

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM

Enhancing Dynamic Cloud-based Services using Network Virtualization

Virtualization, SDN and NFV

Ethernet-based Software Defined Network (SDN)

WHITE PAPER. Network Virtualization: A Data Plane Perspective

Evripidis Paraskevas (ECE Dept. UMD) 04/09/2014

Enhancing Dynamic Cloud-based Services using Network Virtualization

Software Defined Networking A quantum leap for Devops?

SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

Analysis of Network Segmentation Techniques in Cloud Data Centers

Virtual Machine in Data Center Switches Huawei Virtual System

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

Proactively Secure Your Cloud Computing Platform

White Paper Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Cloud Networking From Theory to Practice" Ivan Pepelnjak NIL Data Communications"

CERN Cloud Infrastructure. Cloud Networking

Protecting VMs in a Multi-Tenancy Environment

IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks

VMware vcloud Air Networking Guide

Multitenancy Options in Brocade VCS Fabrics

NEC contribution to OpenDaylight: Virtual Tenant Network (VTN)

What is VLAN Routing?

STORMY WEATHER SECURING CLOUD COMPUTING. Russell Skingsley Director of Advanced Technology Data Centre and Cloud, APAC Juniper Networks

Some Musings on OpenFlow and SDN for Enterprise Networks. David Meyer Open Networking Summit October 18-19, 2011

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

Towards Software Defined Cellular Networks

Chapter 11 Cloud Application Development

DNS use guidelines in AWS Jan 5, 2015 Version 1.0

VIEWABILL. Cloud Security and Operational Architecture. featuring RUBY ON RAILS

Microsegmentation Using NSX Distributed Firewall: Getting Started

Software defined networking. Your path to an agile hybrid cloud network

Guideline for setting up a functional VPN

SDN v praxi overlay sítí pro OpenStack Daniel Prchal daniel.prchal@hpe.com

CoIP (Cloud over IP): The Future of Hybrid Networking

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

OpenFlow/SDN for IaaS Providers

Network Technologies for Next-generation Data Centers

Implementing Trust to Trust Using Customer Edge Switching. Raimo Kantola Aalto University Finland

SDN Architecture and Service Trend

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

ThinkTel ITSP with Registration Setup Quick Start Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University

Installing Intercloud Fabric Firewall

Network Virtualization and Data Center Networks Data Center Virtualization - Basics. Qin Yin Fall Semester 2013

Cisco AnyConnect Secure Mobility Solution Guide

Accelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters

Cloud computing security

Flows as a topology chart

NVO3: Network Virtualization Problem Statement. Thomas Narten IETF 83 Paris March, 2012

Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam

TRILL Large Layer 2 Network Solution

Visibility into the Cloud and Virtualized Data Center // White Paper

Radhika Niranjan Mysore, Andreas Pamboris, Nathan Farrington, Nelson Huang, Pardis Miri, Sivasankar Radhakrishnan, Vikram Subramanya and Amin Vahdat

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, :32 pm Pacific

HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE

SDN in the Public Cloud: Windows Azure. Albert Greenberg Partner Development Manager Windows Azure Networking

Quantum Hyper- V plugin

Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution

Aerohive Networks Inc. Free Bonjour Gateway FAQ

LTE - Can SDN paradigm be applied?

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

Configuring DHCP Snooping

Datacenter Network Virtualization in Multi-Tenant Environments

Cisco Intercloud Fabric Security Features: Technical Overview

Musings on OpenFlow and SDN. David Meyer Cisco Systems OpenFlow Symposium

Installation of the On Site Server (OSS)

SDN PARTNER INTEGRATION: SANDVINE

Top-Down Network Design

Using LISP for Secure Hybrid Cloud Extension

How To Deploy Sangoma Sbc Vm At Amazon Cloud Service (Awes) On A Vpc (Virtual Private Cloud) On An Ec2 Instance (Virtual Cloud)

SDN and Data Center Networks

Software Defined Environments

Bring your virtualized networking stack to the next level

How To Orchestrate The Clouddusing Network With Andn

TRILL for Data Center Networks

Architecting Security for the Private Cloud. Todd Thiemann

Elastic Management of Cluster based Services in the Cloud

Itex VMware NSX Network Virtualization Presentation

Portland: how to use the topology feature of the datacenter network to scale routing and forwarding

Cisco Dynamic Workload Scaling Solution

SOFTWARE DEFINED NETWORKING

SDN Controller Requirement

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

Chris Dagney BROCADE Sr. Sales Engineer. January 23, 2014 ON DEMAND DATA CENTER

Securing Virtual Applications and Servers

Transcription:

Secure Cloud Computing with a Virtualized Network Infrastructure Fang Hao, T.V. Lakshman, Sarit Mukherjee, Haoyu Song Bell Labs

Cloud Security: All or Nothing? Amazon EC2 Government Cloud Shared computing, storage, & network Max sharing, low cost Low security Good enough security with low cost? Dedicated infrastructure, secured facility No sharing, high cost Max security 2

Secure Elastic Cloud Computing (SEC2): Design Goals Isolation: private IP address space and networks, no trespassing traffic Transparency: users don t see underlying data center infrastructure; they only see their own (logical) network Location independence: user s VMs and networks can be physically allocated anywhere in data center Easy policy control: users can change policy settings for cloud resources on the fly Scalability: service scale only restricted by total among of resources available, not dependent on customer composition A few large enterprises vs. many small business or individual users Low cost: use off-the-shelf devices whenever possible 3

Provide Isolation in Traditional Data Center Architecture Core Unique VLAN can be set up for each user Aggregation L3 L2 VLAN extended to hypervisors Each VLAN can have its own IP address space Access VM VM VM VM VM VLAN extended beyond L3 boundaries via VLAN trunking Constraints VLAN scalability Maximum 4K VLAN Ids << number of users Per-user policy customization is difficult E.g. port 80 traffic firewall NAT load balancer host 4

Secure Elastic Cloud Computing (SEC2): Main Idea Partition data center network into smaller domains Use VLANs to isolate customers within a domain No global VLANs VLAN ids reused across domains Glue different edge domains together via one central domain Special forwarding elements (FE) deployed at border of central and edge domain Central controller (CC) stores mapping between user and their VLANs in each edge domain Traffic between edge domains are tunneled through central domain by FEs Per-user policy control Middleboxes attached to FEs Policy routing enforced by FEs CC stores per-customer policy, allow on-the-fly user configuration 5

SEC2 Architecture Customers within an edge domain isolated by VLANs; one VLAN per customer subnet FEs resolve addresses, enforce policies, forward packets; MAC-in-MAC tunnel between FEs across core domain CC stores address mapping, policy rules, VM locations Same customer across multiple domains see one logical network Middleboxes attached to FE Core domain transports packets between edge domains; No VLAN in core, flat L2 network 6

Integration with User s On-Site Network User in-cloud network can be connected to its on-site network via VPN Customer site is a special edge domain 7

Data Forwarding 6 5 1 4 2 3 7 8 1) ARP on VLAN x: What s MAC for IPB? 2) Query CC: IPB,x MACB? 3) Reply from CC: MACB in y, with MACFE2 as tunnel end 4) Install rule at FE1: To MACB: set VLAN y, add tunnel header to MACFE2 5) ARP reply: MACB 6) 7) 8) Data packet forwarding (tunnel header added by FE1, stripped off by FE2 8

Security via Isolation and Access Control Potential attack on Amazon EC2 outlined by Ristenpart et al. CCS 09 Key is to determine co-resident VMs by Determine matching Dom0 IP address via traceroute Test for small round-trip time Check for numerically close IP addresses None of such attack works in SEC2 Traceroute is disabled between different users They don t even know other s IP address All packets across different users are forced to go through FEs round-trip time won t reveal location Private IP addresses: no correlation between different users 9

Concluding Remarks SEC2: a step towards good enough, low cost secure cloud solutions Security via isolation and access control Scalable: well beyond 4K limit imposed by VLAN Low cost Allow high resource utilization Most networking equipments are off-the-shelf, e.g., switches within both edge domains and core domain are regular L2 switches FEs can be L2 switches enhanced with Openflow or SoftRouter like functions 10