“Cloud Computing” Is your INFORMATION secure
description
Transcript of “Cloud Computing” Is your INFORMATION secure
![Page 1: “Cloud Computing” Is your INFORMATION secure](https://reader036.fdocuments.us/reader036/viewer/2022081515/56816678550346895dda162e/html5/thumbnails/1.jpg)
“Cloud Computing”
Is your INFORMATION secure
Beaulah AloysiusCS591 – Fall 2010Prof: Dr. ChowSemester Project Presentation
![Page 2: “Cloud Computing” Is your INFORMATION secure](https://reader036.fdocuments.us/reader036/viewer/2022081515/56816678550346895dda162e/html5/thumbnails/2.jpg)
Why Cloud ?
Beaulah Aloysius 2
Based on 5 important attributes:
1. Multi-tenancy ( shared resources)
2. Massive Scalability
3. Elasticity4. Pay as you go5. Self-Provisioning of resources
12/8/2010
![Page 3: “Cloud Computing” Is your INFORMATION secure](https://reader036.fdocuments.us/reader036/viewer/2022081515/56816678550346895dda162e/html5/thumbnails/3.jpg)
SPI Model
12/8/2010 Beaulah Aloysius 3
![Page 4: “Cloud Computing” Is your INFORMATION secure](https://reader036.fdocuments.us/reader036/viewer/2022081515/56816678550346895dda162e/html5/thumbnails/4.jpg)
Cloud Launches
12/8/2010 Beaulah Aloysius 4
![Page 5: “Cloud Computing” Is your INFORMATION secure](https://reader036.fdocuments.us/reader036/viewer/2022081515/56816678550346895dda162e/html5/thumbnails/5.jpg)
Security Infrastructure Security
Network Level
Host Level
Application Level
Data Security
Data-in-Transit
Data-at-Rest
Data lineage
Data Provenance
Data Remanence
Beaulah Aloysius 512/8/2010
![Page 6: “Cloud Computing” Is your INFORMATION secure](https://reader036.fdocuments.us/reader036/viewer/2022081515/56816678550346895dda162e/html5/thumbnails/6.jpg)
Threats
Abuse and Nefarious Use of Cloud Computing Ex: Anyone with valid credit card2. Insecure Interfaces and APIs Ex: Reusable Tokens, improper authorization3. Malicious Insider4. Shared Technology Issues Ex: No Isolation5. Data Loss or Leakage Ex: Insufficient authentication
12/8/2010 6Beaulah Aloysius
![Page 7: “Cloud Computing” Is your INFORMATION secure](https://reader036.fdocuments.us/reader036/viewer/2022081515/56816678550346895dda162e/html5/thumbnails/7.jpg)
Exploring Information Leakage in Third-Party Compute Clouds – M.I.T Test Bed
• Determine where in the cloud infrastructure an instance is located• Easily determine if two instances are co-resident on the same physical
machine• Attacker launch instances that will be co-resident with other user’s instances • Attacker exploit cross-VM information leakage once co-residentAmazon : EC2 2-regions 3-availability Zones 5 instance type:
1. m1.small2. c1.medium3. m1.large4. m1.xlarge5. c1.xlarge
12/8/2010 Beaulah Aloysius 7
![Page 8: “Cloud Computing” Is your INFORMATION secure](https://reader036.fdocuments.us/reader036/viewer/2022081515/56816678550346895dda162e/html5/thumbnails/8.jpg)
-more• Network probing ( nmap, hping, wget) – both to identify public services hosted
on EC2 and to provide evidence of co-residence.
• EC2 map – Cloud cartography (internal Ip address are statically associated
to avail zone and instance type )
12/8/2010 Beaulah Aloysius 8
![Page 9: “Cloud Computing” Is your INFORMATION secure](https://reader036.fdocuments.us/reader036/viewer/2022081515/56816678550346895dda162e/html5/thumbnails/9.jpg)
Co- residence checkNamely, instances are likely co-resident if they have(1) matching Dom0 IP address,(2) small packet round-trip times, or(3) numerically close internal IP addressesEC2:1. No 2 instance of same account running simultaneously( so n instance run in n
separate machines)2. no more than 8 instance could be co-resident ( small ) Placement Locality:Sequential – Instance running sequentially are assigned to same physical machineParallel – 2 diff instance run at the same time, assigned to same physical machineVM-Leakage:Not just the data cache but any physical machine resources - network access, CPU branch predictors and instruction cache ,DRAM memory bus, CPU pipelines, scheduling of CPU cores and time slices, disk access ,etc
12/8/2010 Beaulah Aloysius 9
![Page 10: “Cloud Computing” Is your INFORMATION secure](https://reader036.fdocuments.us/reader036/viewer/2022081515/56816678550346895dda162e/html5/thumbnails/10.jpg)
VM-Leakage
VM-Leakage:Not just the data cache but any physical machine resources - network access, CPU branch predictors and instruction cache ,DRAM memory bus, CPU pipelines, scheduling of CPU cores and time slices, disk access ,etc
Methods:• Measuring cache utilization : Prime+Probe technique• Estimate the traffic rates• Key stroke attack – timing when typing the password and recover it
12/8/2010 Beaulah Aloysius 10
![Page 11: “Cloud Computing” Is your INFORMATION secure](https://reader036.fdocuments.us/reader036/viewer/2022081515/56816678550346895dda162e/html5/thumbnails/11.jpg)
Incidents
Example:WWW.Dropbox.comSecurity Issue:Open door for vulnerabilityProposedFilters on publisher and user Virtual ImageIsolated VM watcher along with VMM
12/8/2010 11Beaulah Aloysius
![Page 12: “Cloud Computing” Is your INFORMATION secure](https://reader036.fdocuments.us/reader036/viewer/2022081515/56816678550346895dda162e/html5/thumbnails/12.jpg)
Incidents
12/8/2010 Beaulah Aloysius 12
![Page 13: “Cloud Computing” Is your INFORMATION secure](https://reader036.fdocuments.us/reader036/viewer/2022081515/56816678550346895dda162e/html5/thumbnails/13.jpg)
IBM - Proposed
12/8/2010 Beaulah Aloysius 13
![Page 14: “Cloud Computing” Is your INFORMATION secure](https://reader036.fdocuments.us/reader036/viewer/2022081515/56816678550346895dda162e/html5/thumbnails/14.jpg)
VM Watcher
12/8/2010 Beaulah Aloysius 14
![Page 15: “Cloud Computing” Is your INFORMATION secure](https://reader036.fdocuments.us/reader036/viewer/2022081515/56816678550346895dda162e/html5/thumbnails/15.jpg)
Suggested Reading
• Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds, CCS’2009.
• http://cseweb.ucsd.edu/~hovav/dist/cloudsec.pdf
12/8/2010 Beaulah Aloysius 15