Cloud computing in a nutshell



Similar documents
Software Execution Protection in the Cloud

DepSky Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa

Clouds-of-Clouds: Segurança e Confiança no

Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking

Outline. Clouds of Clouds lessons learned from n years of research Miguel Correia

How to Secure Infrastructure Clouds with Trusted Computing Technologies

Recent Advances in Cloud

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud Computing: Outsourcing Computation without Outsourcing Control

Cloud Courses Description

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos

MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

The Cloud, Virtualization, and Security

Introduction to Cloud Computing

Cloud Courses Description

CSE543 Computer and Network Security Module: Cloud Computing

Data Protection: From PKI to Virtualization & Cloud

Security Issues in Cloud Computing

A survey on cost effective multi-cloud storage in cloud computing

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Cloud Computing Trends

Data Centers and Cloud Computing

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Chapter 1: Introduction

Mobile Cloud Computing T Open Source IaaS

Control your corner of the cloud.

ISSN: (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

Index. BIOS rootkit, 119 Broad network access, 107

Private Cloud in Educational Institutions: An Implementation using UEC

CERTIFICATE PROGRAMME ON CLOUD SPECIALISTS DEVELOPMENT

Iaas for Private and Public Cloud using Openstack

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Technical Brief Distributed Trusted Computing

Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Cloud Security:Threats & Mitgations

A Review on Cloud Computing Vulnerabilities

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

Cloud Security Enterprise Concerns and Mitigations. November 3 rd 2015

Ø Teaching Evaluations. q Open March 3 through 16. Ø Final Exam. q Thursday, March 19, 4-7PM. Ø 2 flavors: q Public Cloud, available to public

Cloud Computing. Chapter 1 Introducing Cloud Computing

Solution for private cloud computing

What is Web Security? Motivation

Patterns for Secure Boot and Secure Storage in Computer Systems

Mutual Authentication Cloud Computing Platform based on TPM

Workflow Templates Library

Where every interaction matters.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

IMPLEMENTING DATA SECURITY IN MULTI CLOUD

Definitions. Hardware Full virtualization Para virtualization Hosted hypervisor Type I hypervisor. Native (bare metal) hypervisor Type II hypervisor

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Cloud Computing Security Issues And Methods to Overcome

A Web Base Information System Using Cloud Computing

Deployment Options for Microsoft Hyper-V Server

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

Virtualization System Security

Assignment # 1 (Cloud Computing Security)

A Gentle Introduction to Cloud Computing

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

Cloud Computing and Attacks

Last time. Today. IaaS Providers. Amazon Web Services, overview

Addressing Data Security Challenges in the Cloud

Security in Changing IT Ecosystem: Virtualization and Cloud Computing

TPM Key Backup and Recovery. For Trusted Platforms

Lecture 02b Cloud Computing II

Property Based TPM Virtualization

Data Centers and Cloud Computing. Data Centers

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) Introduction to Cloud Security. Taniya

A Survey on Cloud Security Issues and Techniques

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

Security Issues In Cloud Computing and Countermeasures

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS. Review Business and Technology Series

Virtualization & Cloud Computing (2W-VnCC)

2) Xen Hypervisor 3) UEC

Goals. What is Cloud Computing? 11/11/2010. Understand what cloud computing is and how. Understand the challenges and advantages of cloud computing

Module: Cloud Computing Security

How to Grow and Transform your Security Program into the Cloud

Part V Applications. What is cloud computing? SaaS has been around for awhile. Cloud Computing: General concepts

International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: , Volume-1, Issue-5, February 2014

WIND RIVER SECURE ANDROID CAPABILITY

AHLA. JJ. Keeping Your Cloud Services Provider from Raining on Your Parade. Jean Hess Manager HORNE LLP Ridgeland, MS

Amazon Web Services Demo Tech Exchange. Slides:

What Cloud computing means in real life

FACING SECURITY CHALLENGES

Introduction What is the cloud

Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Improving data integrity on cloud storage services

AVLOR SERVER CLOUD RECOVERY

Survey on Security Attacks and Solutions in Cloud Infrastructure

If you do NOT use applications based on Amazon Web Services raise your hand.

Cloud Computing Security Requirements

Transcription:

Segurança na Nuvem da Confidencialidade à isponibilidade dos ados Miguel Correia Trabalho conjunto com Alysson Bessani, Francisco Rocha, P. Sousa, B. Quaresma, F. André, S. Abreu Jornadas Técnicas de Computação em Nuvem ESTG IPL Leiria, Março 2012 Cloud computing in a nutshell Computing as a utility Public cloud cloud service provider (CSP) different from the cloud user (typ. a company) Pay per use / pay as you go Resource pooling / multi tenancy Elasticity Large scale datacenters 2 Microsoft s Chicago datacenter 1

Cloud computing service models What is the service provided by the cloud? Infrastructure as a Service (IaaS): virtual machines, storage (e.g., Amazon EC2, Amazon S3) Platform as a Service (PaaS): programming and execution (e.g., Google AppEngine, Force.com, Windows Azure) Software as a Service (SaaS): mostly web applications (e.g., Yahoo! Mail, Google ocs, Facebook, ) 3 Security of what from whom? Victim is not the user or cloud; cloud is attack tool User (bad) uses the cloud d( (good) d)to attack others SPAM, os, hosting malicious data, botnet C&C Victim is the cloud User or someone else (bad) attack the cloud (good) Victim is the user Cloud insider or another user (bad) attacks the user (good) 4 2

Security in the cloud (from the cloud user viewpoint) Security is a key aspect of cloud computing Factor that favors and prevents adoption That s how it should be! Challenges The system is no longer in the user premises The infrastructure is shared with other users The access is made through hthe internet The three classical security attributes can be jeopardized: confidentiality, integrity, availability 5 Outline Security and dependability threats in the cloud Stealing data in the cloud Approach 1: improve the IaaS cloud infrastructure Approach 2: build a storage cloud of clouds of clouds Conclusions 6 3

SECURITY AN EPENABILITY THREATS IN THE CLOU 7 Unavailability Problems in the Internet are relatively frequent Congestion, problems with routers / switches / links, Routing problems (Cisco bug + RIPE NCC test Aug. 10) Problems at the cloud (e.g., Amazon EC2 outage May 11) 8 4

Loss and corruption of data Can happen in the cloud as anywhere else Ma.gnolia lost all users data, half TB (Feb. 09) anger Inc. / Sideckick lost contacts, notes, photos, etc. of its clients; took days to recover (Oct. 09) 9 Attacks through management interface Cloud users have access to management interfaces Operations: control/monitor virtual it machines, users, Interfaces: web console, web services, REST Personification attacks through the interface The usual culprits: CSRF, SQL injection, XSS, XML Signature Wrapping (recently found possible in EC2 and Eucalyptus) Phishing / socialengineering attacks to obtain authentication credentials 10 5

Attacks between VMs In IaaS, VMs of several users usually share the same physical machine co residence Attack in two steps Attacker instantiates several VMs until co residence with the victim is achieved The attacker s VM attacks the victim, e.g., using a vulnerability in the hypervisor or using shared resources to obtain confidential information 11 Malicious insider and confidentiality The data is in the cloud and the malicious insider is a real problem CyberLynk (March 09) and Google (early 10) events 12 6

STEALING ATA IN THE CLOU 13 Infrastructure as a Service (VM) Service provided is the execution of Virtual Machines (VMs) full software stack, including OS Servers run an Hypervisor (or VMM) that supports the execution of several VMs 14 7

Experimental environment We played the role of a malicious insider with access to the management VM The cloud was just a single machine Hypervisor was Xen Management VM was Xen om 0 with Linux 1 user VM (victim) with Linux and an Apache server Malicious insider had login in om 0? 15 Attack 1: steal passwords in memory Trivial: take mem snapshot, look for passwords $ xm dump-core 2 -L lucidomu.dump d umping core of domain: 2... $ cat lucidomu.dump strings grep loginpwd loginpwd loginpwd $ cat lucidomu.dump strings grep apachersapwd apachersapwd apachersapwd apachersapwd 16 8

Attack 2: steal private keys in memory Trivial: they re in a standard format in memory $ xm dump-core 2 -L lucidomu.dump d umping core of domain: 2... $ rsakeyfind lucidomu.dump found private key at 1b061de8 version = 00 modulus = 00 d0 66 f8 9d e2 be 4a 2b 6d be 9f de 46 db 5a... publicexponent = 01 00 01 privateexponent =... prime1 =... prime2 =... 17 Attack 3: steal files in file system Trivial: essentially mounting a drive (with LVM) $ lvcreate -L 2G -s -n lv_st /dev/main_vol/domuvol/domu Snapshot victim s VM drive Logical volume lv_st created $ kpartx -av /dev/main_vol/lv_st Add partition map to the new vol.... $ vgscan Search for LVM volumes Found volume group LucidomU $ vgchange -ay LucidomU Activate the snapshot volume $ mount /dev/lucidomu/root /mnt/ 18 9

Current solutions? From Cloud Computing Roundtable (Nov/ec 2010) 5 directors/senior staff from: Google, Microsoft, Cisco, Amazon, Cloud Security Alliance We have very strict procedures in place for when our employees are allowed to [physically] access the machines the customer data resides on. Excellent, but the attacks we saw can be done remotely We keep track of every action that they take on those machines, and we log all that information for later audits Excellent, but detecting in later audits is usually too late there re some things that will never go into [our cloud], for example, our SAP back end 19 Cryptography? Obvious solution: simply encrypt the data But what is data in IaaS? User files, web pages, databases, program variables, etc. Is it possible to modify applications to handle encrypted data? An application server (Tomcat, JBoss, )? Where do we store the encryption keys safely? Some applications manipulate data Arithmetic w/encrypted data: fully homomorphic encrypt. Slow, doesn t work if data encrypted with different keys, application server has also to be modified 20 10

APPROACH 1: IMPROVE THE IAAS CLOU INFRASTRUCTURE 21 Key idea To prove to the cloud user that its data is in a server with a good software configuration (e.g., in which the management VM has no snapshot function) o this using the Trusted Platform Module (TPM), a security chip designed by the Trusted Computing Group, now shipping with common PC hardware 22 11

TPM basic functions Two basic functions: Storage of cryptographic keys e.g. to protect RSA private keys from theft or disclosure System software integrity measurement to check what is the software configuration 23 Measurements TPM has Platform Configuration Registers (PCR) A PCR stores (typically) a measurement of a software block, i.e., its cryptographic hash uring system boot, BIOS stores hash(boot loader) in PCR 0, boot loader stores hash(hypervisor) in PCR 1, A vector of PCR values gives a trusted measurement of the software configuration 24 12

Remote attestation Computer gives to a challenger a measurement of the software configuration, i.e., a vector of PCRvalues Challenger has the Endorsement Key Certificate, signed by the TPM vendor (means it s a real TPM) 2 Request TPM vector of PCRs signed with EK Computer being attested (with TPM) 1 Request attestation 3 PCR vector (signed with EK) Challenger 4 Verify signature and if PCR values match a trusted configuration 25 Approach overview Servers run a Trusted Virtualization Environment (TVE), formed by hypervisor + management VM that the user trusts TVE does not provide dangerous operations to administrators: snapshot, volume mount TVE provides only trusted versions of certain operations: launch, migrate, backup, terminate VMs VMs enter and leave a TVE encrypted Users do remote attestation of TVEs/operations to be sure that their VMs are either in a TVE or encrypted 26 13

Trusted Virtualization Environment The virtualization environment is measured: at boot time, hashes ofthe software components that are stored in PCRs The environment is a TVE if its measurements (PCR values) fall in a set of TVE configurations 27 Open problems Gap between checking a measurement (just a hash) and trusting a complex software module How can we know that there aren t vulnerabilities, undesirable functionality or malware inside? Putting this solution in production is far from simple Short time to market and too many players: cloud provider, software producers, assurance labs, cloud user 28 14

APPROACH 2: BUIL A STORAGE CLOU OF CLOUS 29 Securing the cloud 1 st approach: improve the cloud infrastructure with trusted computing 2 nd approach: build a (virtual) cloud of clouds based on a few clouds First can be implemented by providers, second by users User 30 15

Cloud of clouds benefits Can tolerate data corruption ue to malicious i insiders, id other attacks, accidental faults (e.g., due to bugs) Can tolerate datacenter and cloud outages No vendor lock in Faster read access Confidentiality User 31 Cloud of clouds / epsky system No longer IaaS cloud computing, (only) storage Cloud of clouds l d provides the same service as single cloud: read data, write data, etc. Amazon S3 Nirvanix Rackspace Windows Azure 32 16

epsky design principles 1. No trust on individual cloud providers istributed trust is obtained by using several clouds 2. Use storage clouds as they are No server side code in the replication protocols 3. ata is updatable Byzantine quorum replication protocols for consistency 33 Write protocol time WRITE ATA ACK WRITE METAATA ACK Cloud A Cloud B Cloud C Cloud Assume a version of the file is already stored 34 17

Read protocol highest version number time REA METAATA METAATA REA ATA ATA Cloud A Cloud B Cloud C Cloud ata is fetched from other clouds if needed 35 Limitations of the solution so far ata Limitations: 1. ata is accessible by cloud providers 2. Requires n ata storage space Cloud A Cloud B Cloud C Cloud ata ata ata ata 36 18

Only for data, not metadata Combining erasure codes and secret sharing ata encrypt K key disperse share F 1 F 2 F 3 F 4 S 1 S 2 S 3 S 4 Cloud A Cloud B Cloud C Cloud F 1 S 1 F 2 S 2 F 3 S 3 F 4 S 4 Inverse process for reading Encrypted so data can t be read at a cloud! from f+1 shares/fragments Only twice the size of storage, not 4 times! 37 Performance evaluation setup Prototype: 3K LOCs (Java), REST/HTTPS Experimental setup 2 epsky versions: A (availability), CA (av. + confidentiality) 4 commercial storage clouds: S3 (Amazon S3), WA (Windows Azure), NX (Nirvanix SN) and RS (Rackspace) Clients in 8 PlanetLab sites around the world Three clients on each site, reading/writing data units of three sizes (100KB, 1MB and 10MB) 437000+ reads/writes late 2010 38 19

epsky storage costs ($) epsky A (plain replication) epsky CA (erasure codes) epsky CA storage cost (1M U) 2 (average cloud cost) 39 epsky latency (100KB U) epsky read latency is close to the cloud with the best latency epsky write latency is close to the cloud with the worst latency 40 20

epsky perceived availability Apparently, some clouds don t provide the promised 5 or 6 9 s of availability Internet availability plays an important role 41 CONCLUSIONS 42 21

Conclusions (1) Cloud security is clearly a problem for organizations that want to use it for critical systems/data The malicious insider is an especially hard problem Two approaches, but not exactly for the same problem 43 Conclusions (2) Approach 1 improve the cloud infrastructure with trusted computing Cloud providers may implement something of the kind soon (TCG, Intel, IBM are pushing) Approach 2 build a storage cloud of clouds based on a few clouds A user side solution, so easier to deploy More expensive than single cloud, but not excessively 44 22

More information Google miguel correia inesc id The Final Frontier: Confidentiality and Privacy in the Cloud F. Rocha, S. Abreu, M. Correia, IEEE Computer, September 2011 EPSKY: ependable and Secure Storage in a Cloud of Clouds A. N. Bessani, M. Correia, B. Quaresma, F. André, P. Sousa, Proceedings of EuroSys 2011 Lucy in the Sky without iamonds: Stealing Confidential ata in the Cloud F. Rocha, M. Correia, Proceedings of the 1st CV Workshop, April 2011 23