




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Towards Trusted Cloud ComputingNuno SantosKrishna P. GummadiMPI-SWSRodrigo RodriguesAbstractCloud computing infrastructures enable companies to cut costs by outsourcing computations on-demand. How-ever, clients of cloud computing services currently have no means of verifying the condentialityand int
2、egrity of their data and computation.To address this problem we propose the design of a trusted cloud computing platform (TCCP.TCCP en-ables Infrastructure as a Service (IaaSproviders such as Amazon EC2to provide a closed box execution envi-ronment that guarantees condentialexecution of guest virtua
3、l machines. Moreover, it allows users to attest to the IaaS provider and determine whether or not the ser-vice is secure before they launch their virtual machines.1IntroductionCompanies can greatly reduce IT costs by ofoadingdata and computation to cloud computing services. Still, many companies are
4、 reluctant to do so, mostly due to outstanding security concerns. A recent study 2sur-veyed more than 500chief executives and IT managers in 17countries, and found that despite the potential benets,executives “trustexisting internal systems over cloud-based systems due to fear about security threats
5、 and loss of control of data and systems”.One of the most serious concerns is the possibility of condential-ity violations. Either maliciously or accidentally, cloud providersemployees can tamper with or leak a com-panysdata. Such actions can severely damage the repu-tation or nancesof a company.In
6、order to prevent condentialityviolations, cloud servicescustomers might resort to encryption. While encryption is effective in securing data before it is stored at the provider, it cannot be applied in services where data is to be computed, since the unencrypted data must reside in the memory of the
7、 host running the computa-tion. In Infrastructure as a Service (IaaScloud servicessuch as AmazonsEC2, the provider hosts virtual ma-chines (VMson behalf of its customers, who can do arbitrary computations. In these systems, anyone with privileged access to the host can read or manipulate a customers
8、data. Consequently, customers cannot protect their VMs on their own.Cloud service providers are making a substantial effort to secure their systems, in order to minimize the threat of insider attacks, and reinforce the condenceof cus-tomers. For example, they protect and restrict access to the hardw
9、are facilities, adopt stringent accountabil-ity and auditing procedures, and minimize the number of staff who have access to critical components of the infrastructure 8.Nevertheless, insiders that administer the software systems at the provider backend ultimately still possess the technical means to
10、 access customersVMs. Thus, there is a clear need for a technical solu-tion that guarantees the condentialityand integrity of computation, in a way that is veriableby the customers of the service.Traditional trusted computing platforms like Terra 4take a compelling approach to this problem. For ex-a
11、mple, Terra is able to prevent the owner of a physi-cal host from inspecting and interfering with a compu-tation. Terra also provides a remote attestation capability that enables a remote party to determine upfront whether the host can securely run the computation. This mecha-nism reliably detects w
12、hether or not the host is running a platform implementation that the remote party trusts. These platforms can effectively secure a VM running in a single host. However, many providers run data cen-ters comprising several hundreds of machines, and a cus-tomersVM can be dynamically scheduled to run on
13、 any one of them. This complexity and the opaqueness of the provider backend creates vulnerabilities that traditional trusted platforms cannot address.This paper proposes a trusted cloud computing plat-form (TCCPfor ensuring the condentialityand in-tegrity of computations that are outsourced to IaaS
14、 ser- Figure 1:Simpliedarchitecture of Eucalyptus. vices. The TCCP provides the abstraction of a closed box execution environment for a customersVM, guarantee-ing that no cloud providersprivileged administrator can inspect or tamper with its content. Moreover, before re-questing the service to launc
15、h a VM, the TCCP allows a customer to reliably and remotely determine whether the service backend is running a trusted TCCP implementa-tion. This capability extends the notion of attestation to the entire service, and thus allows a customer to verify if its computation will run securely.In this pape
16、r we show how to leverage the advances of trusted computing technologies to design the TCCP. Section 2introduces these technologies and describes the architecture of an IaaS service. Section 3presents our design of TCCP. Although we do not yet have a work-ing prototype of TCCP, the design is sufcien
17、tlydetailed that we are condentthat a solution to the problem under discussion is possible.2Background2.1Infrastructure as a ServiceToday, myriads of cloud providers offer services at vari-ous layers of the software stack. At lower layers, Infras-tructure as a Service (IaaSproviders such as Amazon,
18、Flexiscale, and GoGrid allow their customers to have access to entire virtual machines (VMshosted by the provider. A customer, and user of the system, is respon-sible for providing the entire software stack running in-side a VM. At higher layers, Software as a Service (SaaSsystems such as Google App
19、s offer complete online ap-plications than can be directly executed by their users. The difcultyin guaranteeing the condentialityof computations increases for services sitting on higher lay-ers of the software stack, because services themselves provide and run the software that directly manipulates
20、customersdata (e.g.,Google Docs. In this paper we focus on the lower layer IaaS cloud providers where se-curing a customersVM is more manageable.While very little detail is known about the internal or-ganization of commercial IaaS services, we describe (andbase our proposal on Eucalyptus 6,an open s
21、ource IaaS platform that offers an interface similar to EC2. Fig-ure 1presents a very simpliedarchitecture of Eucalyp-tus. This system manages one or more clusters whose nodes run a virtual machine monitor (typicallyXen to host customersVMs. Eucalyptus comprehends a set of components to manage the c
22、lusters. For simplicity, our description aggregates all these components in a single cloud manager (CMthat handles a single cluster; we refer the reader to 6for more details.From the perspective of users, Eucalyptus provides a web service interface to launch, manage, and terminate VMs. A VM is launc
23、hed from a virtual machine image (VMIloaded from the CM. Once a VM is launched, users can log in to it using normal tools such as ssh. Aside from the interface to every user, the CM exports services that can be used to perform administrative tasks such as adding and removing VMIs or users. Xen sup-p
24、orts live migration, allowing a VM to shift its physical host while still running, in a way that is transparent to the user. Migration can be useful for resource consolidation or load balancing within the cluster.2.2Attack modelA sysadmin of the cloud provider that has privileged con-trol over the b
25、ackend can perpetrate many attacks in or-der to access the memory of a customersVM. With root privileges at each machine, the sysadmin can install or execute all sorts of software to perform an attack. For example, if Xen is used at the backend, Xenaccess 7al-lows a sysadmin to run a user level proc
26、ess in Dom0that directly accesses the content of a VMsmemory at run time. Furthermore, with physical access to the machine, a sysadmin can perform more sophisticated attacks like cold boot attacks and even tamper with the hardware. In current IaaS providers, we can reasonably consider that no single
27、 person accumulates all these privileges. Moreover, providers already deploy stringent security devices, restricted access control policies, and surveil-lance mechanisms to protect the physical integrity of the hardware. Thus, we assume that, by enforcing a secu-rity perimeter, the provider itself c
28、an prevent attacks that require physical access to the machines.Nevertheless, sysadmins need privileged permissions at the clustersmachines in order to manage the software they run. Since we do not precisely know the praxis of current IaaS providers, we assume in our attack model that sysadmins can
29、login remotely to any machine with root privileges, at any point in time. The only way a sysadmin would be able to gain physical access to a node running a costumersVM is by diverting this VM to a machine under her control, located outside the IaaSsse-curity perimeter. Therefore, the TCCP must be ab
30、le to 1 connethe VM execution inside the perimeter, and 2 guarantee that at any point a sysadmin with root privi-leges remotely logged to a machine hosting a access its memory.2.3Trusted ComputingThe Trusted Computing Group (TCG10set of hardware and software technologies to construction of trusted p
31、latforms. In particular, proposed a standard for the design of the trusted module (TPMchip that is now bundled with hardware. The TPM contains an endorsement (EK that uniquely identiesthe TPM (thus,cal host, and some cryptographic functions be modied.The respective manufacturers sign responding publ
32、ic key to guarantee the chip and validity of the key.Trusted platforms 1,4, 5, 9leverage the features of TPM chips to enable remote attestation . This mecha-nism works as follows. At boot time, the host computes a measurement list ML consisting of a sequence of hashes of the software involved in the
33、 boot sequence, namely the BIOS, the bootloader, and the software implementing the platform. The ML is securely stored inside the hostsTPM. To attest to the platform, a remote party challenges the platform running at the host with a nonce n U . The platform asks the local TPM to create a message con
34、tain-ing both the ML and the n U , encrypted with the TPMsprivate EK . The host sends the message back to the remote party who can decrypt it using the EK scorre-sponding public key, thereby authenticating the host. By checking that the nonces match and the ML corresponds to a congurationit deems tr
35、usted, a remote party can reliably identify the platform on an untrusted host.A trusted platform like Terra 4implements a thin VMM that enforces a closed box execution environment, meaning that a guest VM running on top cannot be in-spected or modiedby a user with full privileges over the host. The
36、VMM guarantees its own integrity until the machine reboots. Thus, a remote party can attest to the platform running at the host to verify that a trusted VMM implementation is running, and thus make sure that her computation running in a guest VM is secure.Given that a traditional trusted platform ca
37、n secure the computation on a single host, a natural approach to se-cure an IaaS service would be to deploy the platform at each node of the servicesbackend (seeFigure 1. How-ever, this approach is insufcient:a sysadmin can divert a customersVM to a node not running the platform, ei-ther when the VM
38、 is launched (bymanipulating the CM, or during the VM execution (usingmigration. Conse-quently, the attestation mechanism of the platform does not guarantee that the measurement list obtained by the remote party corresponds to the actual congurationof the host where the VM has been running (orwill b
39、e run-a remote attestation that guarantees the immutability of the platformssecurity properties in the backend.3Trusted Cloud Computing PlatformWe present the trusted cloud computing platform (TCCPthat provides a closed box execution environment by ex-tending the concept of trusted platform to an en
40、tire IaaS backend. The TCCP guarantees the condentialityand the integrity of a usersVM, and allows a user to de-termine up front whether or not the IaaS enforces these properties. Next section gives an overview of TCCP, and Section 3.2presents a detailed design.3.1OverviewTCCP enhances todaysIaaS ba
41、ckends to enable closed box semantics without substantially changing the archi-tecture (Figure2. The trusted computing base of the TCCP includes two components:a trusted virtual ma-chine monitor (TVMM,and a trusted coordinator (TC.Each node of the backend runs a TVMM that hosts customersVMs, and pre
42、vents privileged users from in-specting or modifying them. The TVMM protects its own integrity over time, and complies with the TCCP protocols. Nodes embed a certiedTPM chip and must go through a secure boot process to install the TVMM. Due to space limitations we will not go into detail about the d
43、esign of the TVMM, and we refer the reader to 5for an architecture that can be leveraged to build a TVMM that enforces local closed box protection against a malicious sysadmin.The TC manages the set of nodes that can run a cus-tomersVM securely. We call these nodes trusted nodes . To be trusted, a n
44、ode must be located within the secu-rity perimeter, and run the TVMM. To meet these con-ditions, the TC maintains a record of the nodes located in the security perimeter, and attests to the nodesplat-form to verify that the node is running a trusted TVMM 1. n N2. ML T C , n N 3. ML N , n T C 4. acce
45、pted T K PNFigure 3:Message exchange during node implementation. The TC can cope with of events such as adding or removing ter, or shutting down nodes temporarily or upgrades. A user can verify whether secures its computation by attesting to the To secure the VMs, each TVMM cooperates with the TC in
46、 order to 1 cution of a VM to a trusted node, and to VM state against inspection or modicationwhen it is in transit on the network. The critical moments that re-quire such protections are the operations to launch , and migrate VMs. In order to secure these operations, the TCCP speciesseveral protoco
47、ls (seeSection 3.2. Due to space constraints, we do not address other critical op-erations such as suspend/resumeallowed by Xen.We assume an external trusted entity (ETEthat hosts the TC, and securely updates the information provided to the TC about the set of nodes deployed within the IaaS perimete
48、r, and the set of trusted congurations.Most im-portantly, sysadmins that manage the IaaS have no priv-ileges inside the ETE, and therefore cannot tamper with the TC. We envision that the ETE should be maintained by a third party with little or no incentive to collude with the IaaS provider e.g., by
49、independent companies analo-gous to todayscerticateauthorities like VeriSign.3.2Detailed DesignThe TC dynamically manages the set of trusted nodes that can host a VM by maintaining a directory contain-T express C N ML T C the canonical congurationsthat a re-mote party is expected to observe when att
50、esting to the platform running on a node N or on the TC, respectively. In order to be trusted, a node must register with the TC by complying to the protocol depicted on Figure 3. In steps 1and 2, N attests to the TC to avoid an imperson-ation of the TC by an attacker:N sends a challenge n N to the T
51、C, and the TC replies with its bootstrap measure-ments ML T C encrypted with EK pauthenticity of the TC. If the M T C to guarantee the T C matches the expected conguration,it means the TC is trusted. Reversely, the TC also attests to N by piggybacking a challenge n T C in message 2, and checking whe
52、ther the node is authentic, and is running the expected conguration(stepnode generates a keypair T K p 3. TheN , T K N P, and sends its public key to the TC. If both peers mutually attest suc-cessfully, the TC adds T K PconrmN to its node database, and sends message 4to that the node is trusted. Key
53、 T K N certiesthat node N is trusted.In the case that a trusted node reboots, the TCCP must guarantee that the nodescongurationremains trusted, otherwise the node could compromise the security of theTCCP. To ensure this, the node only keeps T K pWe present the TCCP protocols to secure the VM launch
54、and migration operations. When launching a VM, the TCCP needs to guarantee that 1 the VM is launched on a trusted node, and 2 the sysadmin is unable to inspect or tamper with the initial VM state as it traverses the path between the user and the node hosting the VM. The ini-tial VM state contains th
55、e VM image (VMI(thatcan be personalized and contain secret data and the users 1. N d , n s 1T K p , N s T K PNP p 2. n s 1, T K N T K P T KdN s N sT C T C N d3. K S , n s 2T K p , N s T K P4. N s , n d T K p , N d T K PP 5. n d , T K N P T K p s T KN dT C6. n d K S7. V M id , #V M id K SN dT CFigure 5:Message exchange during VM migrate. public key (usedfor ssh login 1. In practice, the user can decide to use a VMI provided by the IaaS.To enforce these requirements, the parties involved in launching a VM follow the protocol depicted in Figure 4. The protocol is designed on the fa
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 数据库的数据操作试题及答案研究
- 船舶修理项目风险管理与防范考核试卷
- 碳素材料在精密加工工具中的性能考核试卷
- 公路工程专业发展制度试题及答案
- 培训机构班课管理制度
- 外勤巡夜人员管理制度
- 北京餐饮垃圾管理制度
- 化妆培训学生管理制度
- 农贸市场计量管理制度
- 理解大数据环境下数据库架构的演变试题及答案
- 电子胎心监护应用专家共识解读
- 超标准洪水应急预案
- 美容诊所合作协议书
- 2025湖南中考:英语必背知识点
- 2025年人教版小学一年级下学期奥林匹克数学竞赛试卷(附答案解析)
- 2025年滁州市轨道交通运营有限公司第二批次招聘31人笔试参考题库附带答案详解
- 2025年高考英语考前热点话题押题卷(新高考Ⅰ卷)-2025年高考英语模拟考试(解析版)
- 浙江国企笔试题目及答案
- 2025年内蒙古自治区呼和浩特市中考二模英语试题 (含答案无听力音频及原文)
- 电力现场安全管理课件
- 分子生物学技术在检验中的应用试题及答案
评论
0/150
提交评论