15
“Cloud Computing” Is your INFORMATION secure Beaulah Aloysius CS591 – Fall 2010 Prof: Dr. Chow Semester Project Presentation

“Cloud Computing” Is your INFORMATION secure

  • Upload
    may

  • View
    41

  • Download
    0

Embed Size (px)

DESCRIPTION

“Cloud Computing” Is your INFORMATION secure. Beaulah Aloysius CS591 – Fall 2010 Prof: Dr. Chow Semester Project Presentation. Why Cloud ?. Based on 5 important attributes: Multi-tenancy ( shared resources) Massive Scalability Elasticity Pay as you go Self-Provisioning of resources. - PowerPoint PPT Presentation

Citation preview

Page 1: “Cloud Computing” Is your INFORMATION secure

“Cloud Computing”

Is your INFORMATION secure

Beaulah AloysiusCS591 – Fall 2010Prof: Dr. ChowSemester Project Presentation

Page 2: “Cloud Computing” Is your INFORMATION secure

Why Cloud ?

Beaulah Aloysius 2

Based on 5 important attributes:

1. Multi-tenancy ( shared resources)

2. Massive Scalability

3. Elasticity4. Pay as you go5. Self-Provisioning of resources

12/8/2010

Page 3: “Cloud Computing” Is your INFORMATION secure

SPI Model

12/8/2010 Beaulah Aloysius 3

Page 4: “Cloud Computing” Is your INFORMATION secure

Cloud Launches

12/8/2010 Beaulah Aloysius 4

Page 5: “Cloud Computing” Is your INFORMATION secure

Security Infrastructure Security

Network Level

Host Level

Application Level

Data Security

Data-in-Transit

Data-at-Rest

Data lineage

Data Provenance

Data Remanence

Beaulah Aloysius 512/8/2010

Page 6: “Cloud Computing” Is your INFORMATION secure

Threats

Abuse and Nefarious Use of Cloud Computing Ex: Anyone with valid credit card2. Insecure Interfaces and APIs Ex: Reusable Tokens, improper authorization3. Malicious Insider4. Shared Technology Issues Ex: No Isolation5. Data Loss or Leakage Ex: Insufficient authentication

12/8/2010 6Beaulah Aloysius

Page 7: “Cloud Computing” Is your INFORMATION secure

Exploring Information Leakage in Third-Party Compute Clouds – M.I.T Test Bed

• Determine where in the cloud infrastructure an instance is located• Easily determine if two instances are co-resident on the same physical

machine• Attacker launch instances that will be co-resident with other user’s instances • Attacker exploit cross-VM information leakage once co-residentAmazon : EC2 2-regions 3-availability Zones 5 instance type:

1. m1.small2. c1.medium3. m1.large4. m1.xlarge5. c1.xlarge

12/8/2010 Beaulah Aloysius 7

Page 8: “Cloud Computing” Is your INFORMATION secure

-more• Network probing ( nmap, hping, wget) – both to identify public services hosted

on EC2 and to provide evidence of co-residence.

• EC2 map – Cloud cartography (internal Ip address are statically associated

to avail zone and instance type )

12/8/2010 Beaulah Aloysius 8

Page 9: “Cloud Computing” Is your INFORMATION secure

Co- residence checkNamely, instances are likely co-resident if they have(1) matching Dom0 IP address,(2) small packet round-trip times, or(3) numerically close internal IP addressesEC2:1. No 2 instance of same account running simultaneously( so n instance run in n

separate machines)2. no more than 8 instance could be co-resident ( small ) Placement Locality:Sequential – Instance running sequentially are assigned to same physical machineParallel – 2 diff instance run at the same time, assigned to same physical machineVM-Leakage:Not just the data cache but any physical machine resources - network access, CPU branch predictors and instruction cache ,DRAM memory bus, CPU pipelines, scheduling of CPU cores and time slices, disk access ,etc

12/8/2010 Beaulah Aloysius 9

Page 10: “Cloud Computing” Is your INFORMATION secure

VM-Leakage

VM-Leakage:Not just the data cache but any physical machine resources - network access, CPU branch predictors and instruction cache ,DRAM memory bus, CPU pipelines, scheduling of CPU cores and time slices, disk access ,etc

Methods:• Measuring cache utilization : Prime+Probe technique• Estimate the traffic rates• Key stroke attack – timing when typing the password and recover it

12/8/2010 Beaulah Aloysius 10

Page 11: “Cloud Computing” Is your INFORMATION secure

Incidents

Example:WWW.Dropbox.comSecurity Issue:Open door for vulnerabilityProposedFilters on publisher and user Virtual ImageIsolated VM watcher along with VMM

12/8/2010 11Beaulah Aloysius

Page 12: “Cloud Computing” Is your INFORMATION secure

Incidents

12/8/2010 Beaulah Aloysius 12

Page 13: “Cloud Computing” Is your INFORMATION secure

IBM - Proposed

12/8/2010 Beaulah Aloysius 13

Page 14: “Cloud Computing” Is your INFORMATION secure

VM Watcher

12/8/2010 Beaulah Aloysius 14

Page 15: “Cloud Computing” Is your INFORMATION secure

Suggested Reading

• Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds, CCS’2009.

• http://cseweb.ucsd.edu/~hovav/dist/cloudsec.pdf

12/8/2010 Beaulah Aloysius 15