Hypervisor-based Background Encryption



Similar documents
Introduction to the NI Real-Time Hypervisor

Full Drive Encryption with Samsung Solid State Drives

FDE Performance Comparison. Hardware Versus Software Full Drive Encryption

Disk Encryption. Aaron Howard IT Security Office

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Desktop Virtualization. The back-end

Guardian: Hypervisor as Security Foothold for Personal Computers

QUESTIONS & ANSWERS. ItB tender 72-09: IT Equipment. Elections Project

<Insert Picture Here> Introducing Oracle VM: Oracle s Virtualization Product Strategy

Cloud Computing through Virtualization and HPC technologies

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE

Virtualization in Linux a Key Component for Cloud Computing

Here is a guide on how to encrypt a part of your USB flash drive and access it on any computer:

Red Hat VDI. David Simmons

Parallels Desktop 4 for Windows and Linux Read Me

Best Practices for Virtualised SharePoint

In order to enable BitLocker, your hard drive must be partitioned in a particular manner.

IOS110. Virtualization 5/27/2014 1

Using Synology SSD Technology to Enhance System Performance Synology Inc.

System Requirements. Version 8.2 November 23, For the most recent version of this document, visit our documentation website.

Enabling Technologies for Distributed Computing

Bypassing Self- Encrypting Drives (SED) in Enterprise Environments. Daniel Boteanu Kevvie Fowler November 12 th, 2015

Trusted Computing Basics: Self-Encrypting Drives

How To Stop A Malicious Process From Running On A Hypervisor

Feature List for Kaspersky Security for Mobile

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms

SecureD Technical Overview

Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets

System Requirements Version 8.0 July 25, 2013

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware

Overhead and Performance Impact when Using Full Drive Encryption with HP ProtectTools and SSD

Endpoint protection for physical and virtual desktops

Intro to Virtualization

Date: December 2009 Version: 1.0. How Does Xen Work?

Microsoft SQL Server 2014 Fast Track

CloudBridge. Deliver the mobile workspace effectively and efficiently over any network. CloudBridge features

Allstate Insurance Company s Local Data Protection (LDP) Project

Maximizing VMware ESX Performance Through Defragmentation of Guest Systems. Presented by

WHITE PAPER 1

Using Synology SSD Technology to Enhance System Performance. Based on DSM 5.2

Enabling Technologies for Distributed and Cloud Computing

An Oracle Technical White Paper June Oracle VM Windows Paravirtual (PV) Drivers 2.0: New Features

Quantifying Hardware Selection in an EnCase v7 Environment

Kaspersky Lab s Full Disk Encryption Technology

Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool

Hyper-V Protection. User guide

CSE 501 Monday, September 09, 2013 Kevin Cleary

Architecting High-Speed Data Streaming Systems. Sujit Basu

AppDynamics Lite Performance Benchmark. For KonaKart E-commerce Server (Tomcat/JSP/Struts)

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Virtual Computing and VMWare. Module 4

Virtual Desktops Security Test Report

How To Speed Up A Flash Flash Storage System With The Hyperq Memory Router

USER-MANAGED FILE SERVER BACKUP:

System Requirements for Microsoft Dynamics GP 2015

Windows Server 2008 R2 Essentials

Sage CRM Technical Specification

Cloud Server. Parallels. Key Features and Benefits. White Paper.

Parallels Virtuozzo Containers

RPM Brotherhood: KVM VIRTUALIZATION TECHNOLOGY

Step by step guide how to password protect your USB flash drive

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

The Data Placement Challenge

XTM Web 2.0 Enterprise Architecture Hardware Implementation Guidelines. A.Zydroń 18 April Page 1 of 12

HyperQ Storage Tiering White Paper

Outline. Introduction Virtualization Platform - Hypervisor High-level NAS Functions Applications Supported NAS models

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR

Encrypting with BitLocker for disk volumes under Windows 7

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Test instructions & HW/SW specifications Contents

Dell Virtual Remote Desktop Reference Architecture. Technical White Paper Version 1.0

Virtualization and the U2 Databases

Best Practices for Optimizing Your Linux VPS and Cloud Server Infrastructure

Cloud Performance Benchmark Series

Hardware versus Software

Endpoint protection for physical and virtual desktops

Removing Performance Bottlenecks in Databases with Red Hat Enterprise Linux and Violin Memory Flash Storage Arrays. Red Hat Performance Engineering

Analysis of VDI Storage Performance During Bootstorm

Toolbox 4.3. System Requirements

White Paper. Recording Server Virtualization

Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware vsphere 5

Sage CRM Technical Specification

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

Dualog Connection Suite Hardware and Software Requirements

Sage CRM Technical Specification

PARALLELS CLOUD SERVER

Performance Analysis and Capacity Planning Whitepaper

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu

9/26/2011. What is Virtualization? What are the different types of virtualization.

Oracle Database Backup in the Cloud. An Oracle White Paper September 2008

Using Speccy to Report on Your Computer Components

Citrix XenDesktop Modular Reference Architecture Version 2.0. Prepared by: Worldwide Consulting Solutions

Transcription:

-based Background Encryption Yushi OMOTE University of Tsukuba

Full-Disk Encryption (FDE) Recent study shows 10% of laptop computers are lost or stolen every year* To prevent data breach, many organizations deploy FDE FDE encrypts and protects entire contents in hard disks * Ponemon Institute LLC. Business risk of a lost laptop, April 2009.

-based FDE Commonly-used approach in practice Low initial deployment cost Instant installation Background encryption support Some drawbacks vulnerability dependency App Encrypt ex) BitLocker, Endpoint Encryption, Compusec, WinMagic,...

-based FDE Secure & -independent approach However, HIGH initial deployment cost Manual encryption No background encryption support P2V conversion Put on hypervisor installation Host with configuration App Encrypt ex) Xen-based FDE [Liang 10], TcVisor [Rezaei 10], BitVisor [Shinagawa 09]...

-based FDE requires so much time for deployment (hours) 9 Required time before user can start using PC 8 hours! Manual encryption P2V conversion installation 7 5 2 0 -based (Xen+dmcrypt) 5 mins. -based (BitLocker) Encryption for pre-installed (1TB partition)

Our Goal (hours) 9 Required time before user can start using PC Manual encryption P2V conversion installation 7 5 2 0 -based -based Encryption for pre-installed (1TB partition)

Approach To remove Manual encryption Implement background encryption in hypervisor (hours) Required time for deployment 9 7 To remove P2V conversion & simplify hypervisor installation Leverage Para-pass-throughbased hypervisor [Shinagawa 09] 0 5 2 -based

Approach To remove Manual encryption Implement background encryption in hypervisor (hours) Required time for deployment 9 7 To remove P2V conversion & simplify hypervisor installation Leverage Para-pass-throughbased hypervisor [Shinagawa 09] 0 5 2 -based

Para-pass-through-based (BitVisor VEE 09) Avoid P2V conversion Most I/Os pass-through from guest Make Virtual identical to Physical Pass-through! Simplify hypervisor installation Guest directly handles devices No host

Approach To remove Manual encryption Implement background encryption in hypervisor (hours) Required time for deployment 9 7 To remove P2V conversion & simplify hypervisor installation Leverage Para-pass-throughbased hypervisor [Shinagawa 09] 0 5 2 -based Encryption for pre-installed (500GB partition)

Background Encryption in reads/encrypts/writes disk in parallel with guest Guest performance intermixture Read/write timing

Background Encryption in reads/encrypts/writes disk in parallel with guest Guest performance intermixture Read/write timing

Background Encryption in reads/encrypts/writes disk in parallel with guest Guest performance intermixture Read/write timing

Background Encryption in reads/encrypts/writes disk in parallel with guest Guest performance intermixture Read/write timing

Background Encryption in reads/encrypts/writes disk in parallel with guest Guest performance intermixture Read/write timing

Background Encryption in reads/encrypts/writes disk in parallel with guest Moderation Module Guest performance intermixture Read/write timing

Background Encryption in reads/encrypts/writes disk in parallel with guest Moderation Module Guest performance Piggyback Module intermixture Read/write timing

Background Encryption in reads/encrypts/writes disk in parallel with guest Moderation Module Guest performance Piggyback Module intermixture Read/write timing Scheduling Module

Background Encryption in reads/encrypts/writes disk in parallel with guest Moderation Module Guest performance Piggyback Module intermixture Read/write timing Scheduling Module

Piggyback Module Transparently insert hypervisor requests between guest requests Not virtualize disk interface to avoid P2V Insert request Request Request Request Request

Background Encryption in reads/encrypts/writes disk in parallel with guest Moderation Module Guest performance Piggyback Module intermixture Read/write timing Scheduling Module

Scheduling Module Just before write, check if data to be written is the latest Read/encrypt/ CHECK&write If not the latest, read/ encrypt again Data

Scheduling Module Just before write, check if data to be written is the latest Read/encrypt/ CHECK&write If not the latest, read/ encrypt again Data Data

Scheduling Module Just before write, check if data to be written is the latest Read/encrypt/ CHECK&write If not the latest, read/ encrypt again Data Data

Scheduling Module Just before write, check if data to be written is the latest Read/encrypt/ CHECK&write Check! If not the latest, read/ encrypt again Data Data

Background Encryption in reads/encrypts/writes disk in parallel with guest Moderation Module Guest performance Piggyback Module intermixture Read/write timing Scheduling Module

Moderation Module Observe guest activity for moderation Sleep encryption operation if guest is busy Encrypt

Implementation of Encryption Moderation Full Speed Encryption Enc Enc Enc Enc Enc t Disk freq. > 5 (s/sec) Mouse freq. > 100 (s/sec) Sleep Sleep Sleep Sleep Enc t Sleep Enc Sleep Enc Enc KBD freq. > 5 (s/sec) External Interrupt freq. > 1000 (ints/sec) Busy Idle t

Evaluation Guest disk access throughput Application benchmark Deployment cost of our system Experimental Environment CPU RAM HDD Intel Core 2 Quad Q9550 2.83GHz PC2-6400 4GB Seagate Barracuda 7200.12 1TB Windows 7 Professional 32-bit

Guest Disk Access Throughput (Crystal Disk Mark) Enc/Dec overhead is 2%-24% (not so big) Moderation works fine 140 1M Seq. 0.70 4K Rand. Throughput (MB/sec) 105 70 35 0.53 0.35 0.18 0 Read Write 0 Read Write Baremetal Unencrypted Encrypted (Not yet)

Application Benchmark Moderation works fine % of bare-metal performance 100.0% 75.0% 50.0% 25.0% 0% (PCMark 7) Memory Management Overhead of impl. (BitVisor) Data compression App load startup Web page render Contacts search Unencrypted (Not yet)

Deployment cost of our system 5-10 minutes deployment Configuration (depends on people, 5-10 mins) One Reboot (1-2 mins) installation (within a min) Our System

Summary and Future Work Summary Design and implementation of hypervisorbased background encryption system Instant deployment on pre-install (5-10 mins) Future Work Auto optimization of moderation criteria

Thank you!