Presentation is loading. Please wait.

Presentation is loading. Please wait.

“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten.

Similar presentations


Presentation on theme: "“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten."— Presentation transcript:

1 “Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten Schwan Georgia Tech Information Security Center & Center for Experimental Computer Systems Georgia Institute of Technology Funded by grants from NSF and Intel.

2 Application Characteristics & Needs: Example: 3-tier Web Services Challenges: –Execution with distributed set of resources Information creation, flow, transformation, caching, and access –End user services with well-defined properties Timely information transport and processing; responsiveness despite external threats/attacks; valid outcomes and results; … –Need for online management Continuous monitoring and trust assessment Runtime reorganization to maintain high levels of trust

3 Trusted Passages Approach Create and manage distributed information processing overlays –Example: sets of proxy servers `connecting’ clients with servers Actively manage the overlays to provide online trust guarantees –Example: monitor proxy server behavior and adjust overlay accordingly

4 Approach: Example (refined): Content Caching by Proxies Need for Trusted Passage Simple Trusted Passage: Data caching with web proxies: need for a trusted passage: Client Proxy Server ClientServerProxy

5 Trusted Passages on Virtualized Platforms: General Concept Hypervisor Service VM Guest VM1 Guest VM2 BE NIC Trust Controller App. FE Hypervisor Service VM Guest VM1 Guest VM2 BE NIC Trust Controller App. FE networ k Host1Host2 Overlay node1Overlay node2 networ k Trusted passage

6 Trusted Passages on Virtualized Platforms: Example: Proxy Proxy Data Cache Trust Controller Hypervisor Driver Domain Guest VM BackEnd Trust Monitor Applications FrontEnd NIC networ k To ServerTo Client Logical Interface Guest OS

7 Trusted Passages - Summary of Concept Trusted computing base (hypervisor) Hardware support for isolation and safety (VT technologies) Sophisticated monitoring and detection models and tools: –Isolated trust controllers –Exploiting front end/back end device interactions to eliminate need to instrument Guest OSs “Trusted passages” uses emerging technologies to provide new functionality to end users

8 Trust Modeling and Management Trusted node is one that meets application needs –Delivers desired performance levels –Properly processes and handles information –Probably not compromised `Better’ trusted nodes should be selected to support a “Trusted Passage” Management example: use redundant processing and communication paths to attain higher overall levels of trust

9 Dynamic Trust Evolution Trust Controller (TC) monitors actions of a VM participating in a “Trusted Passage” –Chosen measurements of VM code and data –Logging of externally observed actions (e.g., virtualized device access via Service VM) Trust Controllers compare their measurements for replicated activity Incorrect results or incorrect operations degrade trust in node, whereas correct operations increase trust level Experiment with methods like trust incentives

10 Platform-level Online Monitoring and Introspection Alternative techniques for monitoring guest OS activity –Intercept system activity (e.g., devices vs. using hardware like performance counters) –Dynamic integrity checking (e.g., use OS knowledge to capture and compare key structures jump tables) –Other methods (e.g., middleware instrumentation) Evaluate performance impact of monitoring –Assistance from platform monitoring services? Experiment with trust violations

11 Future Platforms and Services for Trusted Passages Multi-core Hypervisor Domains (VMs) Multi-> Many-Core: Trusted Passages: Using VMs: Specialized VMs: performance impact of using trust controllers Management VMs: trust controller actions on single machines and interactions across multiple machines Monitoring VMs: costs of dynamic trust assessment, introspection, … Future Platform Services: For Trusted Passages: TrustBus: system mechanisms for hardware support for efficient monitoring and management, for on-chip VM-VM interactions, for cross-platform interactions Adaptive Scheduling: for guest VMs vs. Trust Controllers (TC), in response to threats Isolation: Isolating TC-TC from VM-VM interactions for improved survivability

12 Summary Trusted Passages: new functionality relevant to large class of applications –Information stream processing (multimedia, event based systems – e.g., business activity monitoring, caching services with proxies, …) Exploits new technologies (virtualization, multi- core, hardware performance counters) Research Contributions – Useful trust models and dynamic trust evolution –Platform level monitoring and introspection techniques –Provides insights for potential new services for multi- core platforms


Download ppt "“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten."

Similar presentations


Ads by Google