590 likes | 607 Views
Secure network virtualisation with user-centric clouds Fernando M. V. Ramos Assistant Professor. Claim #1. You use cloud services everyday. Claim #2. With a good probability, on February 28 2017 your favourite app stopped working for a few hours. The Internet, 28 February 2017.
E N D
Secure network virtualisation with user-centric cloudsFernando M. V. RamosAssistant Professor
Claim #1 Youuse cloud services everyday
Claim #2 With a good probability, on February 28 2017 your favourite app stopped working for a few hours
High level view User-centric cloud
Scalability Scale out the infrastructure to accommodate growth
Performance Bring the infrastructure closer to the customers
Security More options to secure your infrastructure
Dependability Cloud replication for fault-tolerance
Virtualisation has revolutionized computing • Completely changed the way resources are managed • Is this true for networking? • Many virtualisation primitives (VLAN, NAT, MPLS, etc.) but no network virtualisation per se • Result: • Network provisioning is slow • Mobility is limited • …
Game changer: Software-Defined Networking Traditional SDN • SDN • decoupling of networking planes • logical centralisation of control • network-wide visibility & direct control
Result: network virtualisation • VMware NSX [Koponen2014] • A production-level, cloud-scale network virtualisation platform Source: VMware
Characteristics of existing platforms • Provider-centric • Single operator, single provider • Networking services: traditional • Full virtualisation of topology, addressing and service models • Traditional services • flat L2, L3 routing, ACL filtering
Our goal • User-centric • Public clouds + private datacenters • Networking services: traditional + security & dependability • Full virtualisation of topology, addressing and service models • Traditional services + security & dependability • flat L2, L3 routing, ACL filtering • security & dependability of virtual resources
High level view User-centric cloud U-vNet 2 U-vNet 3 U-vNet 1 Sirius
Main challenges #1 How to offer full network virtualisation across multiple cloud infrastructures? #2 How to guarantee isolationbetween virtual networks? #3 How to embedthe user virtual network into the substrate infrastructure? • Taking into account the available resources and the user’s requirements (including security and dependability)
Sirius system architecture U-vNet ofUser 1 U-vNet OfUserN . . . U-Cloud Orchestrator Network Hypervisor SDN controller VM1 VM1 VM1 VM1 VM1 VM1 VM1 VM1 VM VM1 VM VM VM VM VM GATEWAY GATEWAY Container Container GATEWAY Container Container Container Container Container Container Container Container Hypervisor Container Hypervisor Container Hypervisor Container Hypervisor Container Hypervisor Container Hypervisor OvS OvS OvS OvS OvS GRE TUNNEL GRE TUNNEL GRE TUNNEL OvS Public cloud VM manager Public cloud VM manager Private datacenter VM manager Cloud provider 2 Cloud provider 1 Private cloud User-centric management of SECURE TUNNEL SECURE TUNNEL
Main isolation techniques Tunneling Edge-based address translation ARP handling Flow table isolation
Edge-based address translation • Tenants’ hosts are uniquely identified • hostID = (vSwitchID,vPort) • Edge address translation • We have network-wide visibility and control • At the edge the host MAC is translated to an ephemeral MAC (eMAC) based on the hostID
Other isolation techniques • ARP handling • We emulate ARP functionality as we want unmodified hosts to use our platform • Flow table isolation • Each tenant has a quota of forwarding table space per switch
Secure Virtual Network Embedding • VNE: mapping each virtual network to specific nodes and links in the substrate network • The VNE problem is traditionally formulated with the objective of maximising network provider revenue, by minimising the cost of embedding VN requests • We include securityinto the VNE problem • To enable user-defined security
Our solution We formulate the SecVNE problem and solve it as a Mixed Integer Linear Program (MILP) The novelty of the approach is in considering comprehensive securityaspects over a user-centric cloud model
SecVNE problem Given a virtual network GVwith the requested resources and corresponding security requirements, and the substrate network GS with the resources to serve incoming Virtual Network Requests, can GV be mapped to GSwith the minimum use of resourceswhile satisfying the following constraints? Each virtual link is mapped to the substrate network meeting the bandwidth and security constraints, namely related to confidentiality, integrity and availability; Each virtual node is mapped to the substrate network meeting the CPU capacity and security constraints, namely with regard to trusted executions and availability; Each virtual node is mapped to a substrate node located in a cloud that covers its trust domainsrequirements.
MILP formulation: objective function Minimise the sum of all computing costs + the sum of all communication costs + overall number of hops of the substrate paths for the virtual links
MILP formulation: constraints • Typical • Link mapping for working traffic • Node and link capacity constraints • Security constraints • Node + link + cloud • Availability constraints • Link mapping for backup traffic • Virtual node mapping • Nodes and links disjointness
Main results SecVNE performance without security requirements is similarto traditional algorithms A richer set of features (namely, security and availability) decreases the acceptance ratio, increases the revenue, and increases cost Key finding: by increasing the price of security services by a modestvalue, a u-centric cloud provider attains a profit
Conclusions • User-centric cloudsoffer several advantages over provider-centric clouds • Scalability, performance, security, dependability • Our platform Sirius extends network virtualization with security & dependability, by: • adopting a user-centric paradigm approach • leveraging from a multi-cloud substrate • following an SDN-based approach • enabling user-defined security & dependability
Sirius.next() • Short-term • Improving SecVNE scalability • Efficient heuristics • Virtual network migration • Transparently, across clouds • Medium- to long-term • Programmable user-centric virtual networks • User-centric virtual network functions
Bruno Nunes AlyssonBessani José Soares Rui Miguel Thanks André Mantas JoãoPaulino NunoNeves Luis Ferrolho Diogo Pinto Eric Vial TúlioRibeiro Max Alaluna