160 likes | 276 Views
Provable Security Under Virtualization. Team Members Reehan Ahmed Khan IL (MT2009046) Shweta M (MT2009072) Rishabh Namdeo (MT2009094) Aditya Pendyala (MT2009105) G Md Nabi Saheb (MT2009130). Earlier Days…. “One server, One application” Server resources were underutilized.
E N D
Provable Security Under Virtualization • Team Members • Reehan Ahmed Khan IL (MT2009046) • Shweta M (MT2009072) • Rishabh Namdeo (MT2009094) • Aditya Pendyala (MT2009105) • G Md Nabi Saheb (MT2009130)
Earlier Days….. • “One server, One application” • Server resources were underutilized. • Too much time spent on Server maintenance. • Then came Virtualization Provalbe Security Under Virtualization
VIRTUALIZATION • Provides • Abstraction • Different Operating Systems on same hardware. • Cost Effectiveness • Application provisioning , maintenance, high availability and disaster recovery. • The concept of virtualization resulted in isolation & duplication of real machine – Virtual Machine. • There was a need to monitor VMs and thus came the concept of hypervisor. Provalbe Security Under Virtualization
HYPERVISOR • Virtual Machine Monitor • Monitors memory usage and disk usage of Guests OSs. • 2 types • Type 1(native) - run directly on the host’s hardware. • Type 2(hosted) – top of an Operating System. Provalbe Security Under Virtualization
PROBLEM STATEMENT • Hypervisor definitely gives various advantages but the questions remains if we are compromising on the security of the system. • The security of the system as a whole depends on how secure is the underlying hypervisor. • If we can have a model to prove that the system is as secure as being projected, it would be an advantage for the whole virtual system infrastructure. • Hence we need a provable model for the security system of the hypervisor. Provalbe Security Under Virtualization
Provable Security • A system has provable security if its security requirements can be stated formally in an adversarial model. • One of thetheoretical model : Random Oracle Model. • Random oracles are a mathematical abstraction used in cryptographic proofs. • Used when no known implementable function provides the mathematical properties required by the proof. Random Oracle Model Provalbe Security Under Virtualization
Hypervisor: Xen • Why Xen? • Open source • Stable and widely used • Community of followers • Supports both para and full virtualization. • Salient features • Performance isolation • Support many operating systems • Reduce performance overhead of virtualization Provalbe Security Under Virtualization
Xen Architecture Provalbe Security Under Virtualization
First Deliverable Installing and Configuring Hypervisor • Installing Host Operating System. • Installing Xen on host OS. • Getting the VMM running. • Installing Guest Operating Systems on Xen. Provalbe Security Under Virtualization
Our Approach • Selecting appropriate operating system and installing the selected OS along with Xen. • Getting the hypervisor manager to run successfully on the kernel. • Select appropriate guest OS. • Installing the guest OS as required. Provalbe Security Under Virtualization
Selection of Operating System • Does the kernel support Xen? • Does Xen manager integrate well with the selected OS? • Does it support both para & full virtualization? Provalbe Security Under Virtualization
Getting things up & running • How to manage the grub loader? • How to make sure that the appropriate kernel is booted? • How to access the Xen manager? Provalbe Security Under Virtualization
Guest OS • How does the guest OS selection depends on the base host OS? • What should be the ideal features of the guest OS? • How can the guest OS interact with the hardware? Provalbe Security Under Virtualization
Installing Guest OS • What would be the format of input to the virtual manager(VM)? • What are the options available during the installation? Provalbe Security Under Virtualization
Future Work • Studying the features and properties of hypervisor. • Study the source code. • Developing the security model. Provalbe Security Under Virtualization
Thank you.Questions? Provalbe Security Under Virtualization