Enforcing End-to-end Application Security in the Cloud



Similar documents
How To Make A Complex System Secure In The Cloud

Cloud Computing Technology

Using Cloud Computing to Drive Innovation: Technological Opportunities and

NCTA Cloud Architecture

Integration Architecture & (Hybrid) Cloud Scenarios on the Microsoft Business Platform. Gijs in t Veld CTO BizTalk Server MVP BTUG NL, June 7 th 2012

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Security & Trust in the Cloud

CHAPTER 8 CLOUD COMPUTING

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Cloud Computing. Technologies and Types

Hybrid Cloud Computing

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

CLOUDFORMS Open Hybrid Cloud

A Naïve Approach for Managing Virtualized Resources and Optimistic cost

IT Environments Management

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013

Software-Defined Networks Powered by VellOS

Cloud Computing. Bringing the Cloud into Focus

Data Centers and Cloud Computing. Data Centers

Cloud-based Services: To Move or Not To Move. Seminar Internet Economics Cristian Anastasiu & Taya Goubran

Security Issues in Cloud Computing

Learning from the Cloud providers to use the CMDB to drive cost savings through automation

Platform Leadership in Software as a Service: How Platforms Facilitate Innovation

Certified Cloud Computing Professional VS-1067

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Cloud Computing An Introduction

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices

How To Understand Cloud Computing

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management

Healthcare Enterprise View of Cloud What is Cloud Additional Needs Cloud Models Cloud Economics 101 Stack Decision Framework

Design of Cloud Services for Cloud Based IT Education


IAAS CLOUD EXCHANGE WHITEPAPER

Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center

Cloud computing - Architecting in the cloud

IaaS Federation. Contrail project. IaaS Federation! Objectives and Challenges! & SLA management in Federations 5/23/11

Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled

AskAvanade: Answering the Burning Questions around Cloud Computing

Service Oriented Cloud Computing Architectures. Asher Vitek 12/3/2011 UMM CSci Senior Seminar Conference Morris, MN.

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Licensing Guide for Partners. Leveraging Data Center Providers and Software Services Resellers

6 Cloud strategy formation. 6.1 Towards cloud solutions

SOA and Cloud in practice - An Example Case Study

Cluster, Grid, Cloud Concepts

NATO s Journey to the Cloud Vision and Progress

Cloud Computing. Chapter 1 Introducing Cloud Computing

Architectural Implications of Cloud Computing

Cloud Computing. Lecture 24 Cloud Platform Comparison

Cloud Computing. Cloud computing:

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

CLOUD COMPUTING. When It's smarter to rent than to buy

Securing The Cloud With Confidence. Opinion Piece

Cloud-Security: Show-Stopper or Enabling Technology?

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing

Cloud Computing in the Enterprise: A Question of Control.. And who has it. INF5210 Ben Eaton 12/11/2013

White Paper on CLOUD COMPUTING

CSE543 Computer and Network Security Module: Cloud Computing

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

How To Understand Cloud Computing

Cloud Computing An Elephant In The Dark

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc.

Cloud SingularLogic:

Cloud Computing. Adam Barker

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012

Data Centers and Cloud Computing

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

A Gentle Introduction to Cloud Computing

Oracle Applications and Cloud Computing - Future Direction

ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Cisco Nexus Data Broker: Deployment Use Cases with Cisco Nexus 3000 Series Switches

Deploying a Geospatial Cloud

Transcription:

Enforcing End-to-end Application Security in the Cloud Jean Bacon, David Evans, David M. Eyers, Matteo Migliavacca, Peter Pietzuch, and Brian Shand University of Cambridge, UK Imperial College London, UK CBCU/ECRIC, National Health Serivice, UK {first.surname}@cl.cam.ac.uk {migliava, prp}@doc.ic.ac.uk brian.shand@cbcu.nhs.uk Middleware 2010

Motivation Cloud computing is all the rage Steve Ballmer s talk of Hockey stick cloud growth Rackspace doubled cloud customers over 2009: 50,000 increase Success stories: elasticity for on-line retail and services However security concerns in the cloud will be challenging T-Mobile Sidekick, GMail outages, (older) Amazon S3 failures,... Availability and persistence issues. Responsibility for data recovery? Splitting responsibility: Legal due diligence? Make application needs less abstract... 2

BI: Application-Level Virtualisation Server virtualisation: Isolatable, portable VMs ALV: Isolatable, portable, distributed application instances Not just OS-level process or user-level isolation Match the overall security needs of applications Cloud clients: explicit about application security needs Providers: provide basis for building secure applications End-to-end security as opposed to boundary protection Data-linked guarantees on confidentiality, integrity and availability 3

Evolution from boundary security... Users App 1 Web Server Business Logic Business Logic DB Filestore Filestore Users App 2 Web Server DB 4

... into end-to-end security Users App 1 Business Business Business Logic Logic Logic Web Web Server Web Server Server Users App 2 DB DB DB Filestore Filestore Filestore 5

Talk outline Enabling technologies Clouds, IFC, Asynchronous messaging, RBAC & distributed policy Application-level virtualisation Case studies Pairs trading Healthcare scenarios Outstanding research issues Conclusion 6

Different cloud provider types IaaS: clients rent and manage VMs EC2 (Amazon), Rackspace, and Nimbus PaaS: develop over restricted PL or services Google s App Engine and Microsoft s Azure SaaS: Cloud hosts given application Highest level of abstraction: clients just configure Salesforce Application specific software Middleware, Server software (DBs, Web servers) Operating System IaaS PaaS SaaS Goal: secure IaaS expressiveness with SaaS convenience 7

Information Flow Control (IFC) Event name data type bid body... trader_id trader-77 integrity tags {i-trader-77} {i-trader-77} {i-trader-77} confidentiality tags {dark-pool} {dark-pool,s-trader-77} event parts security label Strong guarantees over: data confidentiality and integrity Labels tag data and processes: facilitates flow constraints Data can only flow to processes with compatible labels Data can only be released that is compatible with label of process Privileges for declassification and endorsement are needed DIFC: decentralised, dynamic control of label definitions 8

Asynchronous messaging with IFC Non-trivial cloud apps are large-scale distributed systems Decoupling is often employed for robustness Even for cloud services that are stateless message passing is useful Robustness during failures and reconfiguration Treat all communicated messages as multi-part structures Independent IFC labelling of parts Data-oriented access control: amenable to middleware protection Parallel processing: each part has its own data and security label. 9

Role-based Access Control (RBAC) Effective technology for large scale privilege management Decouple users from privileges by using roles See ANSI standards Parameterised RBAC: needs inference engine Applications with multiple administrative domains: need Service Level Agreements (SLAs) Distributed RBAC with DIFC Dependent roles Principal Session Roles Privileges 10

Application-level virtualisation Much cloud security is at boundary of infrastructure ALV: end-to-end, data-linked security using DIFC Application specifies explicit data containment policy Useful authority requires coverage of net, IPC, & disk data paths Secrecy, privacy, integrity, availability... Encode legal-level concerns: responsibilities for data management Middleware abstractions should make code more portable Across and between different cloud providers 11

Application-level virtualisation Cloud provider must explicitly specify interactions with the Trusted Computing Base (TCB) e.g. IFC and middleware-managed containers Extend to persistence mechanisms Provider can monitor, audit, enforce, check compliance Cloud provider can reuse security mechanisms to isolate different clients applications 12

Case study: pairs trading Pairs trading is a simple algorithm for stock trading Assume that stocks in a related market will move in a related way Look for divergence and bet on divergence soon reducing Modern exchanges are electronic, event-based systems: Orders are quick transactions, pub/sub for dissemination of stocks Competition in the market makes it very latency sensitive Co-host trading algorithms on server co-located with exchange Large brokers can offer dark pools : avoids exchange 13

Case study: pairs trading Used IFC to support safely co-located pairs trading Protection of market data integrity Strict control of interactions between clients investment strategies Ensure confidentiality of orders in dark pool trading Bulk-move equities without revealing trader s identity Allow auditing by regulatory authorities on completed transactions Treating stock-exchange hosting as a cloud (in effect) Application-level virtualisation protects traders strategies while efficiently utilising infrastructure 14

DEFCon pairs trading event model owns s Stock Exchange owns t 1 secrecy: t 1 owns t 2 KEY: Unit that can declassify all of its state Unit that cannot declassify any of its state Unit that has some state that it cannot declassify Event secrecy: t 2 15

DEFCon pairs trading event model owns s Stock Exchange owns t 1 secrecy: t 1 1 KEY: Unit that can declassify all of its state Unit that cannot declassify any of its state Unit that has some state that it cannot declassify Event secrecy: t 2 owns t 2 16

DEFCon pairs trading event model owns s Stock Exchange owns t 1 secrecy: t 1 1 KEY: Unit that can declassify all of its state Unit that cannot declassify any of its state Unit that has some state that it cannot declassify Event Tick MSFT 1230$ 12:22:13 2 secrecy: t 2 owns t 2 17

DEFCon pairs trading event model Stock Exchange owns s Match buy: GOOG sell: MSFT mean: 1.92 3 owns t 1 secrecy: t 1 1 KEY: Unit that can declassify all of its state Unit that cannot declassify any of its state Unit that has some state that it cannot declassify Event Tick MSFT 1230$ 12:22:13 2 secrecy: t 2 Match buy: MSFT sell: GOOG mean: 1.92 owns t 2 18

DEFCon pairs trading event model Stock Exchange owns s secrecy: t 1 Match buy: GOOG sell: MSFT mean: 1.92 3 owns t 1 1 4 Bid sell: MSFT name: KEY: Tick MSFT 1230$ 12:22:13 Unit that can declassify all of its state Unit that cannot declassify any of its state 2 secrecy: t 2 Match buy: MSFT sell: GOOG mean: 1.92 owns t 2 Ask buy: MSFT name: Unit that has some state that it cannot declassify Event 19

DEFCon pairs trading event model Stock Exchange owns s secrecy: t 1 Match buy: GOOG sell: MSFT mean: 1.92 3 owns t 1 1 4 Bid sell: MSFT name: owns b 5 Broker KEY: Tick MSFT 1230$ 12:22:13 Unit that can declassify all of its state Unit that cannot declassify any of its state 2 secrecy: t 2 Match buy: MSFT sell: GOOG mean: 1.92 owns t 2 Ask buy: MSFT name: Unit that has some state that it cannot declassify Event 20

DEFCon pairs trading event model Stock Exchange KEY: owns s Tick MSFT 1230$ 12:22:13 Unit that can declassify all of its state Unit that cannot declassify any of its state 2 secrecy: t 1 secrecy: t 2 Match buy: GOOG sell: MSFT mean: 1.92 3 Match buy: MSFT sell: GOOG mean: 1.92 owns t 1 1 owns t 2 4 6 Bid sell: MSFT name: Trade symbol: MSFT buyer: seller: Ask buy: MSFT name: owns b 5 Broker Unit that has some state that it cannot declassify Event 21

DEFCon pairs trading event model Stock Exchange KEY: owns s Tick MSFT 1230$ 12:22:13 Unit that can declassify all of its state Unit that cannot declassify any of its state 2 secrecy: t 1 secrecy: t 2 Match buy: GOOG sell: MSFT mean: 1.92 3 Match buy: MSFT sell: GOOG mean: 1.92 owns t 1 1 owns t 2 4 6 Bid sell: MSFT name: Trade symbol: MSFT buyer: seller: Ask buy: MSFT name: owns b 5 Broker owns r,s 7 Delegation user: Unit that has some state that it cannot declassify Event Regulator 22

DEFCon pairs trading event model Stock Exchange KEY: owns s Unit that can declassify all of its state Unit that cannot declassify any of its state Unit that has some state that it cannot declassify Event Tick MSFT 1230$ 12:22:13 2 secrecy: t 1 secrecy: t 2 Match buy: GOOG sell: MSFT mean: 1.92 3 Match buy: MSFT sell: GOOG mean: 1.92 owns t 1 1 owns t 2 4 6 Warning msg: Trading volume exceeded quota Bid sell: MSFT name: Trade symbol: MSFT buyer: seller: Ask buy: MSFT name: 8 owns b 5 Broker owns r,s Regulator 7 Delegation user: 23

DEFCon pairs trading event model Stock Exchange KEY: owns s Unit that can declassify all of its state Unit that cannot declassify any of its state Unit that has some state that it cannot declassify Event Tick MSFT 1230$ 12:22:13 Tick MSFT 1234$ 12:32:13 2 secrecy: t 1 secrecy: t 2 Match buy: GOOG sell: MSFT mean: 1.92 3 Match buy: MSFT sell: GOOG mean: 1.92 owns t 1 1 owns t 2 4 6 Warning msg: Trading volume exceeded quota Bid sell: MSFT name: Trade symbol: MSFT buyer: seller: Ask buy: MSFT name: 8 owns b 5 Broker owns r,s Regulator 7 Delegation user: 9 24

Case study: UK NHS and ECRIC At a high level: UK NHS involves many collaborating but separate organisations Some organisations do similar work aggregate! The organisations software needs to handle access control: ALV E.g. ECRIC is a cancer registry has legal privilege to collect patients records without consent Multi-Disciplinary Teams work in hospitals Work with cancer patients ECRIC currently not connected with them on-line 25

Case study: UK NHS and ECRIC Two separate potential clouds: ECRIC and the hospitals IFC Jail DB Labeler Patterns Patterns Patterns Web server MDT users Event Detection Framework Presentation application Modules Patterns Patterns DB DB ECRIC network ECRIC DMZ N3 NHS network 26

Case study: UK NHS and ECRIC Explore programmer-friendly layers over DEFCon Compile higher-level policy representations into IFC constraints e.g. DPL language for expressing constraints over information flows Couple RBAC policy with event types and thence DIFC treating-doctor(referring-hospital-id, referring-doctor-id, patient-id), consultant-doctor(hospital-id, doctor-id), consultant-referral(referring-doctor-id, doctor-id, patient-id) treating-doctor(hospital-id, doctor-id, patient-id) treating-doctor(hospital-id, doctor-id, patient-id) priv-clinical(patient-id) clinical-researcher(study-id, researcher-id, patient-id) priv-clinical(patient-id) 27

Open research challenges Cloud security mechanisms different trusted code bases and their applicability performance: can policy establishment avoid the critical path? what s the impact of enforcement in general? Policy specification in the cloud programmer friendly make it easy for programmer and for inter-domain agreement RBAC relevance? protecting policy itself: e.g. sensitive tags in labels policy review and formal verification? 28

Conclusion Security in the cloud must be designed in from the start need strong isolation of data, even during outsourced processing isolate users of shared services as well as services Integrate strong end-to-end security mechanisms Decentralised Information Flow Control event-based communication for robust service interconnection role-based policy specification including on processing and storage explicit trusted computing base Our research to date demonstrates feasibility of subparts 29