• Non ci sono risultati.

Security of Cloud Computing

N/A
N/A
Protected

Academic year: 2022

Condividi "Security of Cloud Computing"

Copied!
19
0
0

Testo completo

(1)

Security of Cloud Computing

Fabrizio Baiardi [email protected]

(2)

F.Baiardi – Security of Cloud Computing – Attestation 2

Syllabus

• Cloud Computing Introduction

• Definitions

• Economic Reasons

• Service Model

• Deployment Model

• Supporting Technologies

• Virtualization Technology

• Scalable Computing = Elasticity

• Security

• New Threat Model

• New Attack

• Countermeasures Attestation

(3)

Verifying Computations in a Cloud

Scenario

User sends her data processing job to the cloud.

Clouds provide dataflow operation as a service (e.g., MapReduce, Hadoop etc.) Problem: Users have no way of evaluating the correctness of results

(4)

F.Baiardi – Security of Cloud Computing – Attestation 4

Why another attestation?

• The attestation that may be enabled by a TPM is

static = it guarantees that the software that a VM runs is not malicious when it is loaded

• But the software can become malicious if it is successfully attacked

• Hence some form of dynamic attestation is required

Juan Du, Wei Wei, Xiaohui Gu, and Ting Yu. 2010. RunTest:

assuring integrity of dataflow processing in cloud computing infrastructures. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security

(ASIACCS '10)

(5)

DataFlow Operations

Properties

High performance, in-memory data processing Each node performs a particular function

Nodes are mostly independent of each other Examples

MapReduce, Hadoop, System S, Dryad

(6)

F.Baiardi – Security of Cloud Computing – Attestation 6

How do we ensure DataFlow operation results are correct?

3/22/2010 en.600.412 Spring 2010 Lecture 6 | JHU | Ragib Hasan 6

Du et al., RunTest: Assuring Integrity of Dataflow Processing in Cloud Computing Infrastructures, AsiaCCS 2010

Goals

•To determine the malicious nodes in a DataFlow system

•To determine the nature of their malicious action

•To evaluate the quality of output data

(7)

Possible Approaches

Re-do the computation

Check memory footprint of code execution Majority voting

Hardware-based attestation Run-time attestation

(8)

F.Baiardi – Security of Cloud Computing – Attestation 8

RunTest: Randomized Data Attestation

Idea

For some data inputs, send it along multiple dataflow paths that all provide the same functionalities

Record and match all intermediate results from the matching nodes in the paths

Build an attestation graph using node agreement

Over time, the graph shows which node misbehave (always or time-to-time)

3/22/2010 en.600.412 Spring 2010 Lecture 6 | JHU | Ragib Hasan 8

(9)

Attack Model

Data model:

Input deterministic DataFlow (i.e., same input to a function will always produce the same output)

Data processing is stateless (e.g., selection, filtering) Attacker:

Malicious or compromised cloud nodes

Can produce bad results always or some time

Can collude with other malicious nodes to provide same bad result

(10)

F.Baiardi – Security of Cloud Computing – Attestation 10

Attack Model (scenarios)

Parameters

b_i = probability of providing bad result

c_i = probability of providing the same bad result as another malicious node = probability of providing the same bad result as another

malicious node when a bad result is returned Attack scenarios

• NCAM: b_i = 1, c_i = 0 Non Collusion, Always Misbehaving

• NCPM: 0 < b_i <1, c_i = 0 Non Collusion, Partially Misbehaving

• FTFC: b_i = 1, c_i = 1 Full Time, Full Collusion

• PTFC: 0< b_i < 1, c_i = 1 Partial Time, Full Collusion

• PTPC: 0< b_i < 1, 0 < c_i < 1 Partial Time, Partial Collusion

(11)

Integrity Attestation Graph

Definition:

Vertices: Nodes in the DataFlow paths Edges: Consistency relationships.

Edge weight: fraction of consistent output of all outputs generated from same data items

(12)

F.Baiardi – Security of Cloud Computing – Attestation 12

Consistency Clique

Complete subgraph of an attestation graph which has

2 or more nodes

All nodes always agree with each other (i.e., all edge weights are 1)

1

2

3 5 4

(13)

How to find malicious nodes

Intuitions

Honest nodes will always agree with each other to produce the same outputs, given the same data

Number of malicious nodes is less than half of all nodes

(14)

F.Baiardi – Security of Cloud Computing – Attestation 14

Finding Consistency Cliques: BK Algorithm

Goal: find the maximal clique in the attestation graph

In an undirected graph a clique is a subset of its vertices such that every two vertices in the subset are connected by an edge.

Technique:

Apply Bron-Kerbosch algorithm to find the maximal clique(s) (see better example at Wikipedia)

Any node not in a maximal clique of size k/2 is a malicious node Note: BK algorithm is NP-Hard

Authors proposed 2 optimizations to make it run quicker

(15)

Identifying attack patterns

Non-Collusion Always Misbehave

Partial Time Full Collusion

Full Time Full Collusion

Partial Time Full

Collusion / Non Collusion

Probabilistically Misbehave

(16)

F.Baiardi – Security of Cloud Computing – Attestation 16

Inferring data quality

Quality = 1 – (c/n) where

n = total number of unique data items

c = total number of duplicated data with inconsistent results

(17)

Evaluation

Extended IBM System S

Experiments:

Detection rate

Sensitivity to parameters

Comparison with majority voting

(18)

F.Baiardi – Security of Cloud Computing – Attestation 18

Evaluation

3/22/2010 en.600.412 Spring 2010 Lecture 6 | JHU | Ragib Hasan 18

NCPM (b=0.2, c=0)

Different misbehavior probabilities

(19)

Discussion

Threat model

High cost of Bron-Kerbosch algorithm (O(3n/3))

Results are for building attestation graphs per function Scalability

Experimental evaluation

Riferimenti

Documenti correlati

The splicing mutation affecting the CFTR gene described in this work brings to mind the splicing defect in the ATM gene described by Pagani et al. In summary, our results indicate

[r]

ongesse li gamilli et altri animali delo quali oglo dala rogna et altre infinnitate. Da lontano vegnano gente a togliri de quillo oglo peroché per tucte quelle cen- trate se usa

data were used for future studies to assess the effects of the PAC in critically ill patients (attempting to detect a 5.4% reduction in mortality with the PAC from a control

We performed an open, prospective, randomized, controlled study of the incidence of major organ com- plications in 420 patients undergoing routine coro- nary artery bypass graft

I risultati di questa seconda ondata di studi, mirante ad identificare violazioni delle condizioni e delle procedure di decisione tipiche della teoria standard agli studi

Therefore, the total ozone column taken into account by the radiative transfer model oscillates around 280 DU for the month of June and 265 DU for the month of July, a value which

By combining the results of fault kinematic analysis, tectonic stress estimations, and published GPS data, we create an integrated overview of active deformation in Afar, which