Cloud Computing R esearch

41

description

Cloud Computing R esearch. Roy H. Campbell Director of Assured Cloud Center University of Illinois at Urbana-Champaign August 8 th 2012 Chicago, IL. Security at UIUC. ITI – Information Trust Institute 100+ faculty/students/staff Areas Cloud (Air Force) Power grid (DOE) - PowerPoint PPT Presentation

Transcript of Cloud Computing R esearch

Page 1: Cloud Computing  R esearch
Page 2: Cloud Computing  R esearch

Cloud Computing ResearchRoy H. Campbell

Director of Assured Cloud CenterUniversity of Illinois at Urbana-Champaign

August 8th 2012 Chicago, IL

Page 3: Cloud Computing  R esearch

Security at UIUCITI – Information Trust Institute• 100+ faculty/students/staff• Areas

• Cloud (Air Force)• Power grid (DOE)• Health IT (SHARPS DHHS)• Data Science• Evaluation• Systems and Networking (Boeing)• Science of Security (NSA)• Education (ICSSP – NSF, NSA)

• iti.illinois.edu

Page 4: Cloud Computing  R esearch

Outline

Assured Cloud Center (Air Force)Cloud ComputingCurrent Research ChallengesFuture challenges

Page 5: Cloud Computing  R esearch

Assured Cloud Center (Air Force) – UCoE@UIUCGoal:

Undertake core research and development to address challenges for emerging architectures, algorithms, and techniques to achieve secure and reliable cloud infrastructures and applications

Research focus:

1. New algorithms and techniques to provide reliability and security2. Formal analysis and reasoning about system configurations3. Design and experimental evaluation of prototypes4. Workforce development including education, and technology exchange

Page 6: Cloud Computing  R esearch

Assured Cloud Center – UCoE@UIUCOrganization structure:

Page 7: Cloud Computing  R esearch

Outline

Assured Cloud CenterCloud ComputingCurrent Research ChallengesFuture challenges

Page 8: Cloud Computing  R esearch

What is cloud computing?5th generation of computing

Monolithic Client-Server Web SOA Cloud Services

1970s 1980s 1990s 2000s 2009+

Page 9: Cloud Computing  R esearch

Pros and Cons

Page 10: Cloud Computing  R esearch

Providing a higher level of reliability and availability is one of the biggest challenges of Cloud computing

Growing interest in cloud computingIncreasing number of outages

Google Insight for Search: Cloud Computing

AmazonMicrosoftGoogle

Outage in:

Jul 08: Amazon S3 down 8.5h due to

one single bit flip in Gossip message

Oct 09: MS Azure down 22h due to malfunction in the hypervisor Feb 11: 40K Gmail

Account down 4 days due to a bug

in a storage software update

Apr 11: Amazon EC2 US East down 4 days

due to Network problem and

replicas algorithm

2007 2008 2009 2010 2011

Page 11: Cloud Computing  R esearch

Incidents with Cloud Computing- Providers:• “I discovered that several systems on the Amazon EC2 network were

preforming brute force attacks, against our VoIP servers.”[1]• “Complaints of rampant SIP Brute Force Attacks coming from servers with

Amazon EC2 IP Addresses cause many admins to simply drop all Amazon EC2 traffic.”[2]

• No guarantee that providers will financially survive. What will happen if your provider liquidates? “Cassatt, the San Jose, Calif.-based provider of cloud computing environments, has sold its assets to public IT management firm CA for an undisclosed sum. ” [3]

- Attacks:• BitBucket, DDoS’s Off The Air. “Starting Friday evening, our network

storage became virtually unavailable to us, and the site crawled to a halt.” [4]

Page 12: Cloud Computing  R esearch

Incidents with Cloud Computing- Maintenance:• Maintenance Induced Cascading Failures. “Gmail's web interface had a

widespread outage earlier today, lasting about 100 minutes” [5]- Storage:• T-Mobile: we probably lost all your Sidekick data “Well, this is shaping up to

be one of the biggest disasters in the history of cloud computing, and certainly the largest blow to Danger and the Sidekick platform: T-Mobile's now reporting that personal data stored on Sidekicks has "almost certainly has been lost as a result of a server failure at Microsoft/Danger."” [6]

- Power:• Lightning Strike Triggers Amazon EC2 Outage “Some customers of

Amazon’s EC2 cloud computing service were offline for more than four hours Wednesday night after an electrical storm damaged power equipment at one of the company’s data centers[7]

Page 13: Cloud Computing  R esearch

Magnitude and complexity in Cloud ComputingFive-Minute Snapshot of In-and-Out Traffic within NCSA

Page 14: Cloud Computing  R esearch

Outline

Assured Cloud Center Cloud ComputingCurrent Research ChallengesFuture challenges

Page 15: Cloud Computing  R esearch

Current Research Challenges- Can we trust a virtual machine infrastructure?- Can clouds be real-time?- How do we asses trust in clouds?- Can we monitor the security properties of a cloud?- How do we assess End to End issues?- How do we build resilient virtual machines?- How do we verify assuredness in clouds?- What are the likely attacks?- Are there any legal and privacy concerns?- How do we educate an appropriate workforce?

Page 16: Cloud Computing  R esearch

Can we trust a virtual machine infrastructure?Verifying Trustworthiness of Virtual Appliances Based on Software Whitelists (Rakesh Bobba)

Page 17: Cloud Computing  R esearch

Current Research Challenges- Can we trust a virtual machine infrastructure?- Can clouds be real-time?- How do we asses trust in clouds?- Can we monitor the security properties of a cloud?- How do we assess End to End issues?- How do we build resilient virtual machines?- How do we verify assuredness in clouds?- What are the likely attacks?- Are there any legal and privacy concerns?- How do we educate an appropriate workforce?

Page 18: Cloud Computing  R esearch

Can clouds be real-time?Design of Algorithms and Techniques for Real-time Assuredness in Cloud Computing (Indranil Gupta, Brian Cho)

Page 19: Cloud Computing  R esearch

Current Research Challenges- Can we trust a virtual machine infrastructure?- Can clouds be real-time?- How do we asses trust in clouds?- Can we monitor the security properties of a cloud?- How do we assess End to End issues?- How do we build resilient virtual machines?- How do we verify assuredness in clouds?- What are the likely attacks?- Are there any legal and privacy concerns?- How do we educate an appropriate workforce?

Page 20: Cloud Computing  R esearch

How do we assess trust in clouds?Trust Calculus for assured Cloud Computing (David Nicol, Jingwei Huang)

Page 21: Cloud Computing  R esearch

Current Research Challenges- Can we trust a virtual machine infrastructure?- Can clouds be real-time?- How do we asses trust in clouds?- Can we monitor the security properties of a cloud?- How do we assess End to End issues?- How do we build resilient virtual machines?- How do we verify assuredness in clouds?- What are the likely attacks?- Are there any legal and privacy concerns?- How do we educate an appropriate workforce?

Page 22: Cloud Computing  R esearch

Can we monitor the security properties of a cloud?Cyber Infrastructure Security: Dynamic Policy Monitoring with inference in clouds (Roy Campbell)

Page 23: Cloud Computing  R esearch

Current Research Challenges- Can we trust a virtual machine infrastructure?- Can clouds be real-time?- How do we asses trust in clouds?- Can we monitor the security properties of a cloud?- How do we assess End to End issues?- How do we build resilient virtual machines?- How do we verify assuredness in clouds?- What are the likely attacks?- Are there any legal and privacy concerns?- How do we educate an appropriate workforce?

Page 24: Cloud Computing  R esearch

How do we assess End to End issues?ACC-UCoE: Application-aware Checking for Dependable and Secure Applications: Information Flow Signatures K-Y (Tseng, V. Sidea, R. Iyer, Z. Kalbarczyk)

Page 25: Cloud Computing  R esearch

Current Research Challenges- Can we trust a virtual machine infrastructure?- Can clouds be real-time?- How do we asses trust in clouds?- Can we monitor the security properties of a cloud?- How do we assess End to End issues?- How do we build resilient virtual machines?- How do we verify assuredness in clouds?- What are the likely attacks?- Are there any legal and privacy concerns?- How do we educate an appropriate workforce?

Page 26: Cloud Computing  R esearch

How do we build resilient virtual machines?ACC-UCoE: Building Resilient Virtual Machines: Protection Against Failures and Attacks (C. Pham, P. Cao, R. Iyer, Z. Kalbarczyk)

Page 27: Cloud Computing  R esearch

Current Research Challenges- Can we trust a virtual machine infrastructure?- Can clouds be real-time?- How do we asses trust in clouds?- Can we monitor the security properties of a cloud?- How do we assess End to End issues?- How do we build resilient virtual machines?- How do we verify assuredness in clouds?- What are the likely attacks?- Are there any legal and privacy concerns?- How do we educate an appropriate workforce?

Page 28: Cloud Computing  R esearch

How do we verify assuredness in clouds?Formal Analysis of Cloud Systems (José Meseguer)

Page 29: Cloud Computing  R esearch

How do we verify assuredness in clouds?Coordination and Probabilistic Consistency (Gul Agha)

Page 30: Cloud Computing  R esearch

Current Research Challenges- Can we trust a virtual machine infrastructure?- Can clouds be real-time?- How do we asses trust in clouds?- Can we monitor the security properties of a cloud?- How do we assess End to End issues?- How do we build resilient virtual machines?- How do we verify assuredness in clouds?- What are the likely attacks?- Are there any legal and privacy concerns?- How do we educate an appropriate workforce?

Page 31: Cloud Computing  R esearch

What are the likely attacks?What Incidents Data Tell us About Attackers? R. Bonilla, H. Lin, Z. Kalbarczyk, R. Iyer

Page 32: Cloud Computing  R esearch

Current Research Challenges- Can we trust a virtual machine infrastructure?- Can clouds be real-time?- How do we asses trust in clouds?- Can we monitor the security properties of a cloud?- How do we assess End to End issues?- How do we build resilient virtual machines?- How do we verify assuredness in clouds?- What are the likely attacks?- Are there any legal and privacy concerns?- How do we educate an appropriate workforce?

Page 33: Cloud Computing  R esearch

Are there any legal and privacy concerns?Cloud computing Privacy and Legal Aspects (Masooda Bashir)

Page 34: Cloud Computing  R esearch

Current Research Challenges- Can we trust a virtual machine infrastructure?- Can clouds be real-time?- How do we asses trust in clouds?- Can we monitor the security properties of a cloud?- How do we assess End to End issues?- How do we build resilient virtual machines?- How do we verify assuredness in clouds?- What are the likely attacks?- Are there any legal and privacy concerns?- How do we educate an appropriate workforce?

Page 35: Cloud Computing  R esearch

How do we educate an appropriate workforce?Educational initiatives (Masooda Bashir)

Page 36: Cloud Computing  R esearch

Outline

Assured Cloud Center Cloud Computing Current Research ChallengesFuture challenges

Page 37: Cloud Computing  R esearch

Future challengesHow can we offer Security as a Service in the cloud?

Cloud InfrastructureIaaS

PaaS

SaaS

Infrastructure as a Service (IaaS) Architectures

Platform as a Service (PaaS)Architectures

Software as a Service (SaaS)

Architectures

Cloud Infrastructure

SaaS

Cloud Infrastructure

PaaS

SaaS

Cloud InfrastructureIaaS

PaaS

Cloud Infrastructure

PaaS

Cloud InfrastructureIaaS

Cloud Infrastructure

IaaS

PaaS

SaaSSSaaS

Software Security as a Service(SSaaS)

Architectures

Page 38: Cloud Computing  R esearch

Technology Transfer: Scott Pickard 217-333-3437 [email protected]

Commercialization Startups from ITI

Page 39: Cloud Computing  R esearch

Thank you for your attentionContact information:

Roy H. Campbell [email protected] http://assured-cloud-computing.illinois.edu http://srg.cs.illinois.edu

Page 40: Cloud Computing  R esearch

References1. http://www.stuartsheldon.org/blog/2010/04/sip-brute-force-attack-originating-from-amazon-ec2-hosts2. http://www.voiptechchat.com/voip/457/amazon-ec2-sip-brute-force-attacks-on-rise3. http://venturebeat.com/2009/06/04/cloud-provider-cassatt-sells-out-to-ca-to-avoid-bankruptcy4. http://blog.bitbucket.org/2009/10/04/on-our-extended-downtime-amazon-and-whats-coming5. http://gmailblog.blogspot.com/2009/09/more-on-todays-gmail-issue.html6. http://www.engadget.com/2009/10/10/t-mobile-we-probably-lost-all-your-sidekick-data7. http://www.datacenterknowledge.com/archives/2009/06/11/lightning-strike-triggers-amazon-ec2-outage

Page 41: Cloud Computing  R esearch

Cloud Computing ResearchRoy H. Campbell

Director of Assured Cloud CenterUniversity of Illinois at Urbana-Champaign

August 8th 2012 Chicago, IL