SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud...

19
SilverLine: Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1

Transcript of SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud...

Page 1: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

SilverLine: Data and Network Isolation

for Cloud Services

Yogesh MundadaAnirudh Ramachandran

Nick Feamster

1

Page 2: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

Cloud Computing Advantages

• Reduced operational costs

• Reduced management overhead

• Easier resources scaling

• Lowers the barrier to entry for new services

Cloud revenue for 2010 was $68 billion.Estimated revenue for 2014 is $150 billion.

2

Page 3: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

Recent Cloud Data Leak Incidents

• Microsoft BPOS cloud service data breach

(Dec 2010)

• Heroku cloud application platform vulnerability

(Jan 2011)

• Dropbox hash-tag security flaw (May 2011)

3

Occurrences such as these make adoption of the cloud harder

Page 4: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

Top Cloud Computing Threats

• Shared resources

– Heroku

4

• Data loss and leakage

– Microsoft BPOS

– Dropbox

Page 5: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

SilverLine Solution: Isolation

Problem Attack Solution

Data Loss

Service exploit, Operatingenvironment exploit, Misconfigurations

SilverLine’sInformation Flow Tracking and Control

NetworkSide-Channels

Gain moreinformation about the environment through namespace, RTT and hop-count study

SilverLine’sobfuscation of network metrics to reduce the information entropy.

5

Page 6: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

• Information Flow Tracking– Add taints or labels to data– Track the taints– System Call Hooks

• Components of the system– Tracker: Initialize and track

taints, on end hosts– Enforcer: Stop unauthorized

data flow, in the network

SilverLine Data Isolation

6

Page 7: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

7

Example Setting

SilverLine Storage service

With automatically created labels for each

database record

Page 8: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

8

Example Setting

Alex’s records are Labeled with a taint ‘A’

Page 9: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

9

Example Setting

VM instancethat runs

application logic

Page 10: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

10

Example Setting

Custom LOGIN module &

Declassifier

Page 11: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

11

Example Setting

Network Level Enforcer in Dom0

Page 12: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

Normal User’s Interaction

Alex’sWorkerProcess

A2. Authen-ticateAlex toDeclassifier

A1. Login &“Get My Balance”

A3. Start WorkerProcess

A4. GetAlex’s

Balance

A5. Ans =$100,

Label=‘A’

A6. LabeledReplies

A7. Alex’sReplies pass

A8. Reply= $100

12

Page 13: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

An Attacker’s Interaction

Bob’sWorkerProcess

B1. Login,SQL exploit to get

Bob & Alex’s Balance

B2. Authen-ticateBob

B3. StartWorkerprocess

B4. GetBob &Alex’s

Balance

B5. Ans=($10,$100)Label=‘B,A’

B6. Labeledreplies

B7. Bob’sReplies are

blocked

13

Page 14: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

SilverLine Configuration

• Labeling Service

– Specify Taint Creation Policy when query := “INSERT” and table := “USERS”: Generate

a new label; add it to the DB record

• Custom Login module– Provided by each tenant

– Authorizes legitimate users

14

Page 15: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

SilverLine Solution: Isolation

Problem Attack Solution

Data Loss

Service exploit, Operatingenvironment exploit, Misconfigurations

SilverLine’sInformation Flow Tracking and Control

NetworkSide-Channels

Gain moreinformation about the environment through namespace, RTT and hop-count study

SilverLine’sobfuscation of network metrics to reduce the information entropy.

15

Page 16: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

• IP address obfuscation– Actual Internal IP to Pseudo IP

– OpenFlow protocol

• Entirely in the software

• Minimal changes

SilverLine Network Isolation

16

VM1

Click Software Routerwith OpenFlowClick

VM2 VM3

LocalController

Actual IP Pseudo IP

a.b.c.d w.x.y.z

--------- ---------

CentralizedController

Page 17: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

• Normalize network metrics

– Realistic RTTs between instances

– Minimal threshold on hop counts

– Modified openflow module for per packet decision

SilverLine Network Isolation

17

vitf0

vitf1 vitf1

eth0

vitf0

eth0

OpenFlowClickElement

From ExternalVirtual Machines To External

Virtual Machines

From InternalVirtual Machines

To InternalVirtual Machines

Delay Queue to simulate realistic delaysbetween virtual machines

Page 18: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

Summary• Data Isolation: Information Flow Tracking

• Network Isolation: Reducing the entropy of the network side-channels

Future Work• Measure the taint leakage

• Fine grained tainting in a VMM

SilverLine

18

Page 19: SilverLine: Data and Network Isolation for Cloud Services · Data and Network Isolation for Cloud Services Yogesh Mundada Anirudh Ramachandran Nick Feamster 1. ... •Reduced management

Questions

19

Bob’sWorkerProcess

B1. Login,SQL exploit to get

Bob & Alex’s Balance

B2. Authen-ticateBob

B3. StartWorkerprocess

B4. GetBob &Alex’s

Balance

B5. Ans=($10,$100)Label=‘B,A’

B6. Labeledreplies

B7. Bob’sReplies are

blocked