370 likes | 622 Views
FlexCloud : Reliable and Secure Cloud Overlay Infrastructures. Prof. Dr. Alexander Schill. 2013. Outline. Cloud Computing … What is it all about ? Problems π -Box : Building your personal secure cloud π -Data Controller: Secure Cloud Storage Conclusion & Future Work.
E N D
FlexCloud: Reliable and Secure Cloud Overlay Infrastructures Prof. Dr. Alexander Schill 2013
Outline CloudComputing … • Whatisit all about? • Problems • π-Box: Buildingyour personal securecloud • π-Data Controller:Secure Cloud Storage • Conclusion & Future Work
The shape of a cloud … … is in theeyeofthebeholder. IaaS/PaaS* Cloud Operating System, partofAzurePlatform SaaS* Customizedapplicationsforbusinessandhomeuser, based on Google App Engine, e.g. collaborationtools IaaS* Migration ofvirtualmachinesbetween private andpublicclouds PaaS* Development andhostingof web applications SaaS/PaaS* Business cloudservicesfocussing on customerrelationshipmanagement *SaaS = Software as a Service PaaS = Platformas a Service IaaS = Infrastructure as a Service
Cloud Computing Characteristics On-demandself service Rapid elasticity Broadband networkaccess Measured andoptimized service Resource pooling Cloud Computing is … … the on-demand and pay-per-useapplication of virtualised IT services over the Internet. Adopted from the NIST Definition of Cloud Computing [MeGr2011]
Service & Deployment Models User/Clients Cloud Architecture Stack Cloud Organization Software Services (SaaS) User Interface Machine Interface Adopted from [MeGr2011] and [BKNT2010] Applications Convenience Public Applications Services Platform Services (PaaS) Hybrid Components Services Programming Environment Execution Environment Community Infrastructure Services (IaaS) Compute Network Storage Private Virtual Resource Set (VRS) User Control Physical Resource Set (PRS)
Cloud Computing … • Whatisit all about? • Problems • π-Box: Buildingyour personal securecloud • π-Data Controller:Secure Cloud Storage • Conclusion & Future Work
Problems ofCloudComputing Reliability andsecuritywhengivingupphysicalpossession >Failureofmonocultures >Cloudproviders‘ trustworthiness >Staying in control
FlexCloudObjectives π-Cloud: Establishing a secure cloud computing life cycleHybrid cloud platform to integrate a user’s (cloud) resources, services and data. > Unified Cloud Prevent Vendor-Lock-in + Integration of existing IT > Secure Cloud Ensure data privacy and security > ManagedCloud Keep the user in command > EfficientCloud Adapt to user preferences and cloud's vital signs
Cloud Computing … • Whatisit all about? • Problems • π-Box: Buildingyour personal securecloud • π-Data Controller: Secure Cloud Storage • Conclusion & Future Work
FlexCloud'sApproach Subsume all end devices within a Personal Secure Cloud (π-Cloud) controlled by the π-Box. π-Cloud π-Box
Transparent Encryption Documentclassificationconcerningsecurityrequirements. Analysis ofstructured, unstructureddataand contextinformation Addresseeidentificationandderivationofrespectivekeys. π-Cloud PKI ?
Cloud Computing … • Whatisit all about? • Problems? • π-Box: Buildingyour personal securecloud • π-Data Controller: Secure Cloud Storage • Conclusion & Future Work
Increasing Availability: from RAID to RAIC RAIC:Redundant Array of Independent Clouds RAID:Redundant Array of Independent Disks Integration Layer Integration Layer Webaccess Distributed filesystem Logical partition Versioning Preprocessing Layer File leveltransformation(e.g. compression) Preprocessing Layer RAID levelredundancyroutine(mirror, stripe, …) Dispersalroutine Reliablediskstorage Unreliable, lowqualityharddisk Reliable, universal andsecurecloudstorage Unreliable, proprietaryandinsecurecloudstorage Fragment leveltransformation (e.g. encryption) Transport Layer Transport Layer Caching Block resources Localpersistence Provider Storage API adapter
Secure Cloud Storage Integrator for Enterprises (System Architecture) π-Cloud=Company Intranet π-Data Controller Meta Data WebDAV HTTP CIFS Cryptography API FTP Cloud StorageProtocol Adapter Shared Folder File Dispersion WebDAV HTTP
Storing Files (1/5) π-Cloud=Company Intranet π-Data Controller Meta Data Cryptography Cloud StorageProtocol Adapter Shared Folder File Dispersion
Implementation of the Shared Folder • Technology: FUSE (Filesystem in Userspace) • CIFS/SMB network share on proxy file server • Unified user interface for arbitrary cloud storage services • Utilizing CIFS access control mechanisms ./xmp /tmp/fuse ls - /tmp/fuse libfuse glibc glibc User space Kernel VFS FUSE NFS Ext3 … CIFS = Common Internet File System NFS = Network File System Ext3 = Third Extended File System SMB = Server Message Block FUSE = Filesystem in Userspace VFS = Virtual File System glibc = GNU C library
Storing Files (2/5) π-Cloud=Company Intranet π-Data Controller Meta Data Cryptography Cloud StorageProtocol Adapter Shared Folder File Dispersion
File Dispersion Ensure availability despite ofunreliable cloud storage providers … kthreshold, i.e. # ofnecessarysharestoreconstruct • ntotal # ofshares a fileissplitinto E.g. k=6, n=8 If k < n, weneedredundant information.
Sharing Reconstruction Dealer Share holders … Input: Share holders store Reconstructor … Output: Secret Sharing aka Threshold Schemes • Objective: Divide a secret in shares with • Knowledge of any or more shares makes easily computable. • Knowledge of any or fewer shares leave completely undetermined (in the sense that all its possible values are equally likely).
Secret Sharing:An informal example with 2 shares • Visual Cryptography[NaSh1994] • Simplification: n = k = 2 • Secretcannotbedeterminedindependently! [Source:http://goo.gl/watJC] • … revealed!
Secret Sharing: More formalism Blakley's scheme[Blakley1979] Idea: Any n nonparallel n-dimensional hyper-planes intersect at a specific point. Sharing: Encode the secret as any single coordinate of the point of intersection. Recovering:1. Calculating the planes' point of intersection. 2. Take a specified coordinate of that intersection. s3 s Example:n≥3, k=3 2 sharesavailable 3sharesavailable 1 shareavailable Shamir's scheme[Shamir1979] Idea: It takes k points to define a polynomial of degree k-1. Sharing: Be a0:=s є S the secret to be shared where S is an infinite field known to all share holders.Randomly choose (k-1) coefficients a1,a2,…ak-1 є Sto build f(x):=Σai·xi.Calculate shares sj:=[j,f(j)]with j є ℕn. Recovering:Use Lagrange interpolation to find coefficients of the polynomial including constant term a0. Graphics taken from Wikipedia. s2 s1
Information Dispersal:Computationally secure secret sharing • Rabin's scheme[Rabin1989] • Guarantees only availability but no secrecy. • ConstructionBe where , i.e. .Rest as with Shamir's secret sharing. • Properties • With a polynomial and shares of the same size as before, we can now share a value times as long as before. • Length of each share is only -th of the length of the secret, and if shares must be sufficient for reconstruction, one can obviously not get shorter.➔ Space optimal • However, one might gain some information if he gets access to several shares.➔ Computationally secure • More efficient information dispersal schemes • Need to be maximum distance separable to use arbitraryshares for reconstruction. • Examples:Cauchy-Reed-Solomon, Liberation, Blaum-Roth [PSS2008]
Storing Files (3/5) π-Cloud=Company Intranet π-Data Controller Meta Data Cryptography Cloud StorageProtocol Adapter Shared Folder File Dispersion
Cryptography: Confidentiality & Integrity AES-CBC + SHA256 +SHA256 AES-CBC + SHA256 AES-CBC AES-CBC + SHA256
Storing Files (4/5) π-Cloud=Company Intranet π-Data Controller Meta Data Cryptography Cloud StorageProtocol Adapter Shared Folder File Dispersion
Storing Files (5/5) • StoredMeta Data per component • Shared Folder: General filesysteminformation, e.g. filesize, accessrights … • File Dispersion:Useddispersionalgorithm/parameters (n, k), shares‘ locations • Cryptography:Usedcryptographickeysandcalculated checksums per share • Cloud StorageProtocol Adapter: Storage protocolparametersandproviderlogindata π-Cloud=Company Intranet π-Data Controller Meta Data Cryptography Cloud StorageProtocol Adapter Shared Folder File Dispersion
Retrieving Files (1/3) • Dispersion parameters: n=6 π-Cloud=Company Intranet π-Data Controller Meta Data Cryptography Cloud StorageProtocol Adapter Shared Folder File Dispersion
Retrieving Files (2/3) • Dispersion parameters: n=6, k=3 π-Cloud=Company Intranet π-Data Controller Meta Data Cryptography Cloud StorageProtocol Adapter Shared Folder File Dispersion
Retrieving Files (3/3) π-Cloud=Company Intranet π-Data Controller Meta Data Cryptography Cloud StorageProtocol Adapter Shared Folder File Dispersion
Prototype Implementation [SBM+11] π-Cockpit desktop application [SGS11] web interface for π-Cockpit ResUbic Cloud Storage Allocator for Cyber Physical Systems
Performance Evaluation Upload File size: 24 MB; Dispersion parameters: n=8, k=6; Cryptographyparameters: AES (256 bit, 14 iterations), SHA256; Network Up/Downlink: 10/20 Mbit/s Towards User Centric Data Governance and Control in the Cloud
Performance Evaluation Download File size: 24 MB; Dispersion parameters: n=8, k=6; Cryptographyparameters: AES (256 bit, 14 iterations), SHA256; Network Up/Downlink: 10/20 Mbit/s Towards User Centric Data Governance and Control in the Cloud
Cloud Computing … • Whatisit all about? • Problems? • π-Box: Buildingyour personal securecloud • π-Data Controller:Secure Cloud Storage • Conclusion & Future Work
Results so far & future work (π-Data Controller) • Data store for database system (block-based dispersion) • Collaboration scenarios, file sharing, access by external entities • Securing the meta data database • Automatic classification of data • Improving performance, e.g. scheduling algorithms, caching/prefetching, parallelization • Optimized cloud storage • Integration ofexistingcloudstorageservices (Cloud-of-Clouds) • Proxy serverfor transparent mediation➔ easy tousefor end-user, commonschemeforenterprises • Good performance, high security & data control for the user
Cloud Adaption and Optimization Strategies for the compensation ofSLA violations Strategies for minimization ofenergy consumption Mechanisms for the visuali-zationof complex CloudMonitoring data Fine-grained Service Level Agreements Methods to determine fine-grained non-functional properties of Cloud Services Identification of assets andcorresponding requirements Deduction of monitoringtargets from SLAs Cloud Surveillanceand Incident Detection Specification of monitoringtargets and SLA violationsModels for the proactive recognition ofSLA violations and the evaluation of aCloud‘s energy efficiency Mechanisms for reliable distributed Monitoring Dynamic ProviderSelection and Cloud Setup Flexible distribution mechanisms forCloud Platforms Strategies for the performance optimization ofCloud Applications Reputation consideration to improve reliabilityand trustworthiness Towards a secure cloud life cycle
Tomorrow's forecast: still cloudy but sunny spots Contact: alexander.schill@tu-dresden.destephan.gross@tu-dresden.de http://flexcloud.eu/
References • [BKNT2010] C. Baun, M. Kunze, J. Nimis and S. Tai: Cloud Computing. Web-basiertedynamische IT-Services. Springer Verlag, 2010. • [Blakley1979] G. R. Blakley: Safeguarding cryptographic keys; AFIPS Conference Proceedings Vol. 48, National Computer Conference (NCC) 1979, 313-317. • [MeGr2011] P. Mell and T. Grace: The NIST Definition of Cloud Computing. NIST Special Publication 800-145, September 2011. • [NaSh1994] M. Naor and A. Shamir, Visual Cryptography , Eurocrypt 94. • [PSS2008] J. S. Plank, S. Simmerman, C. D. Schuman: Jerasure: A Library in C/C++ FacilitatingErasureCodingfor Storage Applications – Version 1.2. Technical Report CS-08-627, University of Tennessee, 2008. • [Rabin1989] M. O. Rabin: Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance; Journal of the ACM 36/2 (1989) 335-348. • [SBM+2011] J. Spillner, G. Bombach, S. Matthischke, R. Tzschicholz, and A. Schill: Information Dispersion over Redundant Arrays of Optimal Cloud Storage for Desktop Users. In: IEEE International Conference on Utility and Cloud Computing. Melbourne, Australien, December 2011. • [SGS2011] R. Seiger, S. Groß, and A. Schill: A Secure Cloud Storage Integrator for Enterprises. In: International Workshop on Clouds for Enterprises. Luxemburg, September 2011. • [Shamir1979] A. Shamir: How to Share a Secret; Communications of the ACM 22/11 (1979) 612- 613.