Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cloud Computing Security, Reliability and Availability Issues Reference: Chapter 22, Guide to Computer Network Security, 2nd Edition, Springer, 2013. Joseph.

Similar presentations


Presentation on theme: "Cloud Computing Security, Reliability and Availability Issues Reference: Chapter 22, Guide to Computer Network Security, 2nd Edition, Springer, 2013. Joseph."— Presentation transcript:

1 Cloud Computing Security, Reliability and Availability Issues Reference: Chapter 22, Guide to Computer Network Security, 2nd Edition, Springer, 2013. Joseph M. Kizza

2  Reference: Chapter 22, Guide to Computer Network Security, 2 nd Edition, Springer, 2013. Joseph M. Kizza.

3  Cloud computing as a technology is difficult to define because it is evolving without a clear start point and no clear prediction of its future course.  The cloud technology seems to be in flax, hence it may be one of the foundations of the next generation of computing.  It’s built on a solid array of fundamental and proven technologies: virtualization, virtualization, grid computing, grid computing, service oriented architectures, service oriented architectures, distributed computing, distributed computing, broadband networks, broadband networks, browser as a platform, browser as a platform, free and open source software, free and open source software, autonomic systems, autonomic systems, web application frameworks web application frameworks service level agreements. service level agreements.

4  [NIST] - is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources like networks, servers, storage, applications and services that can be rapidly provisioned and released with minimal management effort or service provider interaction.

5 Cloud Computing Model

6 Benefits of Cloud Computing Reduced Cost Automatic Updates Green Benefits of Cloud computing Remote Access Disaster Relief Self-service provisioning Scalability Reliability and fault- tolerance Ease of Use Skills and Proficiency Response Time Increased Storage Mobility

7 Cloud Security Cloud Security

8 Historical Carryover  The Cloud process has taken years through seven software models.  Carefully examination reveals backward compatibilities or the carryovers of software security vulnerabilities through all the models.  Many, if not all of the security issues in those models were carried over into the cloud computing model.

9  Security is and continues to be a top issue in the cloud computing model.  The other three related issues are: performance, performance, compliance compliance Availability Availability  Greg Papadopoulos, CTO of Sun Microsystems –”cloud users normally “trust” cloud service providers with their data like they trust banks with their money”.

10 Security Players and Roles  To understand cloud security, understand: players and their roles players and their roles application or data in play application or data in play  Main players: cloud provider, cloud provider, customer who is the data owner and who seeks cloud services from the cloud provider customer who is the data owner and who seeks cloud services from the cloud provider user who may or may not be the owner of the data stored in the cloud. user who may or may not be the owner of the data stored in the cloud.  The first two players have delegated responsibilities to all who work on their behalf.  To fully understand the roles and responsibilities assigned to each look at the access control processes for three of the top cloud providers: Amazon Web Services (AWS), Amazon Web Services (AWS), Microsoft Windows Azure Microsoft Windows Azure Rackspace. Rackspace.

11 Amazon Web Services  Amazon Web Servises (AWS) EC2 - the solution is through use of Amazon Identity and Access Management (IAM). Amazon Identity and Access ManagementAmazon Identity and Access Management  This allows the account owner to create multiple accounts for other authorized users on a single amazon account.  Each user is then assigned permissions on the main account, accessible via userid and passwords based on the user’s role and responsibility in the customer’s company.  Based on the traditional access control, fine grained security can be attained for all service users.

12 Microsoft Windows Azure  Microsoft Azure uses a home grown Azure Platform AppFabric Access Control Service (ACS), to manage user access security. Key Features of ACS include: Integrates with Windows Identity Foundation (WIF) and tooling Integrates with Windows Identity Foundation (WIF) and tooling Out-of-the-box support for popular web identity providers including: Windows Live ID, Google, Yahoo, and Facebook Out-of-the-box support for popular web identity providers including: Windows Live ID, Google, Yahoo, and Facebook Out-of-the-box support for Active Directory Federation Services 2.0 Out-of-the-box support for Active Directory Federation Services 2.0 Support for OAuth 2.0 (draft 13), WS-Trust, and WS-Federation protocols Support for OAuth 2.0 (draft 13), WS-Trust, and WS-Federation protocols Support for the SAML 1.1, SAML 2.0, and Simple Web Token (SWT) token formats Support for the SAML 1.1, SAML 2.0, and Simple Web Token (SWT) token formats Integrated and customizable Home Realm Discovery that allows users to choose their identity provider Integrated and customizable Home Realm Discovery that allows users to choose their identity provider An OData-based Management Service that provides programmatic access to ACS configuration An OData-based Management Service that provides programmatic access to ACS configuration A Web Portal that allows administrative access to ACS configuration A Web Portal that allows administrative access to ACS configuration

13 Rackspace  Rackspace uses client authentication called Cloud Authentication Service, also known as Auth.  Auth allows each client needing authentication to obtain an authentication token and a list of regional service endpoints to the various services available in the cloud.  Users must authenticate with their credentials, but once authenticated they can create/delete containers and objects within that account.  Since the Cloud Files system is designed to be used by many different customers. Each user account is the user’s portion of the Cloud Files system. Each user account is the user’s portion of the Cloud Files system. Each client authentication is provided via a ReST interface which requires two headers, X-Auth-User and X-Auth-Key or X-Auth- Token with values for the username and API Access Key respectively. Each client authentication is provided via a ReST interface which requires two headers, X-Auth-User and X-Auth-Key or X-Auth- Token with values for the username and API Access Key respectively. Clients obtain this token, along with the Cloud Servers API URL, by first using the Rackspace Cloud Authentication Service. Clients obtain this token, along with the Cloud Servers API URL, by first using the Rackspace Cloud Authentication Service.

14 Security of Data and Applications in the Cloud  Focus first on the security and role of the hypervisor and then the servers on which user services are based.  A hypervisor also called virtual machine manager (VMM), is one of many hardware virtualization techniques allowing multiple operating systems, termed guests, to run concurrently on a host computer.  The hypervisor is pigbacked on a kernel program, itself running on the core physical machine running as the physcial server.  The hypervisor presents to the guest operating systems a virtual operating platform and manages the execution of the guest operating systems.  Multiple instances of a variety of operating systems may share the virtualized hardware resources  The security of the hypervisor therefore involves the security of the underlying kernel program and the underying physical machine, the plysical server and the invidual vrtual operating systems and their achoring virtual machines.

15  There are two types of hypervisors:  Type 1 (or native, bare metal) hypervisors run directly on the host's hardware to control the hardware and to manage guest operating systems.  All guest operating systems then run on a level above the hypervisor.  This model represents the classic implementation of virtual machine architectures. Modern hypervisors based on this model include Citrix XenServer, VMware ESX/ESXi, and Microsoft Hyper-V. XenServerVMware ESXHyper-VXenServerVMware ESXHyper-V

16 Type 1 Hypervisor

17  Type 2 (or hosted) hypervisors run within a conventional operating system environment. With the hypervisor layer as a distinct second software level, guest operating systems run at the third level above the hardware. With the hypervisor layer as a distinct second software level, guest operating systems run at the third level above the hardware. Modern hypervosirs based on this model include KVM and VirtualBox. Modern hypervosirs based on this model include KVM and VirtualBox.

18 Type 2 Hypervisor

19 Hacking The Hypervisor  In his blog “Yes, Hypervisors Are Vulnerable”, Neil MacDonald, Vice President and a Gartner Fellow [12], observes the following about hypervisor and the vulnerabilities associated with it: The virtualization platform (hypervisor/VMM) is software written by human beings and will contain vulnerabilities. Microsoft, VMware, Citrix, and other, all of them will and have had vulnerabilities. The virtualization platform (hypervisor/VMM) is software written by human beings and will contain vulnerabilities. Microsoft, VMware, Citrix, and other, all of them will and have had vulnerabilities. Some of these vulnerabilities will result in a breakdown in isolation that the virtualization platform was supposed to enforce. Some of these vulnerabilities will result in a breakdown in isolation that the virtualization platform was supposed to enforce. Bad guys will target this layer with attacks. The benefits of a compromise of this layer are simply too great. Bad guys will target this layer with attacks. The benefits of a compromise of this layer are simply too great. While there have been a few disclosed attacks, it is just a matter of time before a widespread publicly disclosed enterprise breach is tied back to a hypervisor vulnerability. While there have been a few disclosed attacks, it is just a matter of time before a widespread publicly disclosed enterprise breach is tied back to a hypervisor vulnerability.

20  As far back as 2006, Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang and Jacob R. Lorch demonstrate in their paper “SubVirt: Implementing malware with virtual machines”, the use of type of malware, which called a virtual-machine based rootkit (VMBR), installing a virtual-machine monitor underneath an existing operating system and hoists the original operating system into a virtual machine.  In fact the authors demonstrated a malware program that started to act as its own hypervisor under Windows.  In fact the authors demonstrated a malware program that started to act as its own hypervisor under Windows.

21  The IBM X-Force 2010 Mid-Year Trend and Risk Report, show that every year since 2005, vulnerabilities in virtualization server products, the hypervisors, have overshadowed those in workstation products, an indication of the hackers interest in the hypervisors.  The report further shows that 35% of the server virtualization vulnerabilities are vulnerabilities that allow an attacker to “escape” from a guest virtual machine to affect other virtual machines, or the hypervisor itself.  Because hypervisors in type-1 environment are granted CPU privilege to access all system I/O resources and memory.

22 Securing Load Balancers  For every hypervisor, there is a load balancer, used to route traffic to different virtual machines to help spread traffic evenly across available machines.  A Load balancers in a hypervisor plays a vital role of ensuring a fair distribution of available load to all virtual machines especially during high traffic and ensuring the full utilization of the cloud infrastructure. Elastic load balancers play a central in the cloud infrastructure along the following lines: It listens to all traffic destined for the internal network and distribute incoming traffic across the cloud infrastructure. It listens to all traffic destined for the internal network and distribute incoming traffic across the cloud infrastructure. automatically scales its request handling capacity in response to incoming application traffic. automatically scales its request handling capacity in response to incoming application traffic. It creates and manage security groups associated with each instance and provides additional networking and security options if and when needed. It creates and manage security groups associated with each instance and provides additional networking and security options if and when needed. It can detect the health of the virtual machines and if it detects unhealthy load-balanced virtual machine, it stops routing traffic to it and spreads the load across the remaining healthy virtual machines. It can detect the health of the virtual machines and if it detects unhealthy load-balanced virtual machine, it stops routing traffic to it and spreads the load across the remaining healthy virtual machines. It supports the ability to stick user sessions to specific virtual machines. It supports the ability to stick user sessions to specific virtual machines. It supports SSL termination at the Load Balancer, including offloading SSL decryption from application virtual machines, centralized management of SSL certificates, and encryption to backend virtual machines with optional public key authentication. It supports SSL termination at the Load Balancer, including offloading SSL decryption from application virtual machines, centralized management of SSL certificates, and encryption to backend virtual machines with optional public key authentication. It supports use of both the Internet Protocol version 4 and 6 (IPv4 and IPv6). It supports use of both the Internet Protocol version 4 and 6 (IPv4 and IPv6).

23 Virtual Operating Systems Security  Host security Through hosts like workstations, user gain access to the virtual machine system, hence to the cloud. Two problems are encoutered here: Through hosts like workstations, user gain access to the virtual machine system, hence to the cloud. Two problems are encoutered here: escape-to-hypervisor vulnerabilities - that allow intruders to penetrate the virtual machine from the host.escape-to-hypervisor vulnerabilities - that allow intruders to penetrate the virtual machine from the host. escape-to-host vulnerabilities – that allow vulnerabilities in the virtual machine to move to the hosts.escape-to-host vulnerabilities – that allow vulnerabilities in the virtual machine to move to the hosts.

24 Security of Data in Transition – Best Practices  Service Level Agreements (SLAs) - a service contract between the provider of a service and the client defining the level of expected service in terms of security, availability and performance. There are a series of service contracts between cloud providers and clients to define the level(s) of service based on the types of services sought by the client because the effectiveness of these contracts depend on how well maximized and tailored these services are to the particular needs of each client There are a series of service contracts between cloud providers and clients to define the level(s) of service based on the types of services sought by the client because the effectiveness of these contracts depend on how well maximized and tailored these services are to the particular needs of each client

25  Data Encryption - The moment data leaves your end- point web-cloud access point in your location, it travels via a public network and stored in shared environment – the cloud.  In a public or in a shared environments, data can be: intercepted and infiltrated by intruders from within and outside the cloud and during transmission from man in the middle cryptoanalysists. intercepted and infiltrated by intruders from within and outside the cloud and during transmission from man in the middle cryptoanalysists. o prevent these kinds of breaches strong encryptions and authentications regimes are needed. o prevent these kinds of breaches strong encryptions and authentications regimes are needed. Encryption to safeguard any kinds of data breaches required a strong access control and authentication to all web-based cloud resource interface, encryption of all administrative access to the cloud hypervisor, all access to applications and data. Encryption to safeguard any kinds of data breaches required a strong access control and authentication to all web-based cloud resource interface, encryption of all administrative access to the cloud hypervisor, all access to applications and data.

26  Web Access Points Security - Most cloud access instances are web-based. Most security breaches to stored data originated from Web applications. Needs strong security controls in the cloud APIs. Needs strong security controls in the cloud APIs.  Compliance - most clouds are either public, community or hybrids and clients using these clouds usually are in businesses that deal with personal data. Cloud providers must observe a number of compliance regulations including (USA): Cloud providers must observe a number of compliance regulations including (USA): FISMA,FISMA, HIPAA,HIPAA, SOXSOX SAS 70 II for clouds based in the United States,SAS 70 II for clouds based in the United States, Data Protection Directive (EU)Data Protection Directive (EU)Data Protection DirectiveData Protection Directive In addition, providers accepting payments using credit card must comply with PCI DSS.In addition, providers accepting payments using credit card must comply with PCI DSS.PCI DSSPCI DSS

27 Introduction to MapReduce

28  Google (2005), US patent (2010)  General idea - co-locate data with computation nodes Data decomposition (parallelization) - no data/order dependencies between tasks (except the Map-to-Reduce phase) Data decomposition (parallelization) - no data/order dependencies between tasks (except the Map-to-Reduce phase) Try to utilise data locality (bandwidth is $$$) Try to utilise data locality (bandwidth is $$$) Implicit data flow Implicit data flow Partial failure handling (failed map/reduce tasks are re- scheduled) Partial failure handling (failed map/reduce tasks are re- scheduled)  Structure Map - for each input (K i,V i ) produce zero or more output pairs (K m,V m ) Map - for each input (K i,V i ) produce zero or more output pairs (K m,V m ) Combine - optional intermediate aggregation (less M->R data transfer) Combine - optional intermediate aggregation (less M->R data transfer) Reduce - for input pair (K m, list(V 1,V 2... V n )) produce zero or more output pairs (K r,V r ) Reduce - for input pair (K m, list(V 1,V 2... V n )) produce zero or more output pairs (K r,V r )

29


Download ppt "Cloud Computing Security, Reliability and Availability Issues Reference: Chapter 22, Guide to Computer Network Security, 2nd Edition, Springer, 2013. Joseph."

Similar presentations


Ads by Google