28
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 6 09/01/20 11 Security and Privacy in Cloud Computing 9/01/2011 Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 1

Security and Privacy in Cloud Computing

  • Upload
    hei

  • View
    31

  • Download
    0

Embed Size (px)

DESCRIPTION

Security and Privacy in Cloud Computing. Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011. Lecture 6 09/01/ 2011. Securing Clouds in the Control Plane. Goal : Learn about different techniques for protecting a cloud against insider adversaries Reading - PowerPoint PPT Presentation

Citation preview

Page 1: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 1

Ragib HasanUniversity of Alabama at BirminghamCS 491/691/791 Fall 2011 Lecture 6

09/01/2011

Security and Privacy in Cloud Computing

9/01/2011

Page 2: Security  and  Privacy  in  Cloud Computing

2

Securing Clouds in the Control Plane

9/01/2011 Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011

Goal: Learn about different techniques for protecting a cloud against insider adversaries

Reading

Santos et al., Towards Trusted Cloud Computing, HotCloud 2009

Krautheim, Private Virtual Infrastructure for Cloud Computing, HotCloud 2009

Wood et al., The Case for Enterprise-Ready Virtual Private Clouds, HotCloud 2009

Page 3: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 3

The IaaS security problem

9/01/2011

The cloud acts as a big black box, nothing inside the cloud is visible to the clients

Clients have no idea or control over what happens inside a cloud

Even if the cloud provider is honest, it can have malicious sys admins who can tamper with the VMs and violate confidentiality and integrity

Page 4: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 4

How to ensure that the cloud has not been tampered with?

• Naïve Approach 1: Just trust the cloud provider– Why won’t work: Provider may be honest, sys admins may not be so

• Naïve Approach 2: As the cloud provider to allow auditing of the cloud by the client– Why won’t work: Providers are not willing to open their system to

outside audits

• Workable Approach 3: Ask cloud provider for unforgeable proof/attestation– Why may work: A third party proof not revealing other information

may be enough for both client and provider

9/01/2011

Page 5: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 5

How to audit with a third party?

• Allow third party access to cloud?

• Use trusted hardware

9/01/2011

Page 6: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 6

Trusted Hardware

Key idea– The malicious party can control some software,

but cannot control/compromise a small hardware component

– The malicious party does not have access to the cryptographic keys stored in the hardware

9/01/2011

Page 7: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 7

Examples of Trusted Hardware

• Lightweight Trustworthy Platform Module (TPM)

• Powerful cryptographic co-processors – E.g., IBM 4758 / 4764 Crypto Co-processors

9/01/2011

Page 8: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 8

Example TPM from Infineon

9/01/2011

Page 9: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 9

Trusted Platform Module (TPM)

9/01/2011

TPMs are inexpensive chips now included in most laptops

Can be the building block for a trusted computing base

Can bootstrap trust in a system

Endorsement Key: A private (RSA) key that identifies the chip

Platform Configuration Register (PCR) : Can contain hashes of system configurations

Cannot (easily) be compromised to get the keys

Page 10: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 10

How TPM’s work

• A TPM acts as a root of trust for remote attestation

• The PCRs can contain configuration measurements (for software loaded on the system)

9/01/2011

Page 11: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 11

Using TPM to secure clouds

9/01/2011

Page 12: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 12

Trusted Cloud Computing Platform by Santos et al., HotCloud 09

9/01/2011

Problem Insiders with root access can compromise confidentiality of client virtual machines

Possible solution?: Encrypt virtual machines, but sooner or later, it has to be decrypted to run

Possible Solution?: Only allow nodes running trustworthy software to decrypt the VM

Page 13: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 13

Problem details

How to determine a cloud control operation is trustworthy?– Cloud Control Operation example:

Launch a virtual machineTransfer a virtual machine image

9/01/2011

Page 14: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 14

Threat Model

Attacker– A malicious insider with root level

access to cloud nodes (i.e., can install new software, modify existing software etc., inspect VMs running on a node)

– Does not have physical access to machine

9/01/2011

Page 15: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 15

How determine if a node is trustworthy?

Major events that causes changes– Node start, VM Launch, VM migration

How to determine trustworthiness?– A node is trustworthy if it has a trustworthy

configuration (e.g., h/w, software etc.)– Remote attestation can help in verifying

configurations

9/01/2011

Page 16: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 16

TCCP Architecture

• Nodes run Trusted Virtual Machine Monitors (TVMM), and TVVM configuration can be certified by TPMs

• External Trusted Entity (ETE) or the Trusted Coordinator (TC) is the trusted third party that verifies the node

9/01/2011

Page 17: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 17

Key ideas

• Attackers have access to regular cloud nodes

• But Attackers DO NOT have access to the trusted co-ordinator (TC)

9/01/2011

Page 18: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 18

TCCP Protocols

9/01/2011

Node registration

Page 19: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 19

TCCP Protocols

9/01/2011

VM Launch

Page 20: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 20

TCCP Protocols

9/01/2011

VM Migrate

Page 21: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 21

TCCP limitations

• Any single point of failure?

• Will it increase the attack surface?

• How about cost-effectiveness?

9/01/2011

Page 22: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 22

Private Virtual Infrastructure Krautheim, HotCloud09

9/01/2011

Problem The abstraction of a cloud hides the internal security details from clients, which in turn causes them to mistrust the cloud.

Idea • Cloud provider and client collaborate to create a trusted system.

• Separate the different clients through their exclusive private virtual infrastructures

• Give more control to the cloud clients

Page 23: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 23

Separating the Fabric from the Cloud

• Cloud provider owns and operates the underlying fabric of the cloud (e.g., h/w and minimal amount of software)

• Clients own the virtual data center infrastructure

• Resource provisioning and management is done by the client using a “Factory” (which can be off the cloud)

9/01/2011

Page 24: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 24

5 Tenets of Cloud Computing Security

• Provide a trusted foundation• Provide a secure provisioning factory• Provide measurement and attestation

mechanisms • Provide secure shutdown and destruction of

VMs• Provide continuous monitoring and auditing

9/01/2011

Page 25: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 25

LoBots

LoBots – Secure VM Architecture and transfer protocol– Act as the trusted agent of the PVI factory inside a

cloud– Can measure and monitor cloud on behalf of the

factory

9/01/2011

Page 26: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 26

PVI Model

9/01/2011

Page 27: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 27

CloudNetWood et al., HotCloud 09

Problem: Migrating to cloud is difficult for enterprise applications

Opening up network to outside access can expose system to outsider attacks

Solution:– Merge VPN technology with clouds– Network provider collaborates to set up a VPN link

between enterprise and cloud9/01/2011

Page 28: Security  and  Privacy  in  Cloud Computing

Ragib Hasan | UAB CIS | CS491/691/791 Fall 2011 289/01/2011

Further Reading

TPM Reset Attack http://www.cs.dartmouth.edu/~pkilab/sparks/

Halderman et al., Lest We Remember: Cold Boot Attacks on Encryption Keys, USENIX Security 08, http://citp.princeton.edu/memory/