Shakeel Butt [email protected] H. Andres Lagar-Cavilla [email protected] Abhinav...

40
Shakeel Butt [email protected] u H. Andres Lagar- Cavilla [email protected] Abhinav Srivastava [email protected] om Vinod Ganapathy [email protected] Self-service Cloud Computing Published in Proceedings of ACM CCS’12

Transcript of Shakeel Butt [email protected] H. Andres Lagar-Cavilla [email protected] Abhinav...

Page 1: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

Shakeel [email protected]

H. Andres [email protected]

Abhinav [email protected]

Vinod [email protected]

Self-service Cloud Computing

Published in Proceedings of ACM CCS’12

Page 2: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

2

• By 2015, 90% of government agencies and large companies will use the cloud [Gartner, “Market Trends: Application Development Software, Worldwide, 2012-2016,” 2012]

• Many new companies & services rely exclusively on the cloud, e.g., Instagram, MIT/Harvard EdX [NYTimes, “Active in Cloud, Amazon Reshapes Computing,” Aug 28, 2012]

Page 3: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

3

Virtualized cloud platforms

Hardware

Hypervisor

Management VM (dom0)

Work VM

Work VM

Work VM

Examples: Amazon EC2, Microsoft Azure, OpenStack, RackSpace Hosting

Page 4: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

4

Embracing the cloud

Lets do Cloud

Page 5: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

5

Embracing the cloud

Trust me with your code & data

Cloud ProviderClient

You have to trust us as well

Cloud operators

Problem #1 Client code & data secrecy and integrity vulnerable to attack

Page 6: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

6

Embracing the cloud

Problem #1 Client code & data secrecy and integrity vulnerable to attack

Page 7: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

7

Embracing the cloud

Problem #2 Clients must rely on provider to deploy customized services

I need customized malware detection and VM rollback

Cloud ProviderClient

For now just have checkpointing …

Cloud ProviderClient

Page 8: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

8

Why do these problems arise?

Hardware

Hypervisor

Management VM (dom0)

Work VM

Work VM

Work VM

Page 9: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

9

Hypervisor

Client’s VM Management VM

Code Data Checking daemon

Sec.Policy

Resume guest

1

2

3

Process the page

Alertuser

Example: Malware detection

?

[Example: Gibraltar -- Baliga, Ganapathy, Iftode, ACSAC’08]

Page 10: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

10

Hypervisor

Client’s VM Management VM

Code Data Checking daemon

Sec.Policy

Resume guest

1

2

3

Process the page

Alertuser

?

Problem Clients must rely on provider to deploy customized services

Page 11: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

11

Hypervisor

Client’s VM Management VM

Code Data Checking daemon

Sec.Policy

Resume guest

1

2

3

Process the page

Alertuser

?

Problem Client code & data secrecy and integrity vulnerable to attack

Malicious cloud operator

Page 12: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

12

Hypervisor

Client’s VM Management VM

Code Data Checking daemon

Sec.Policy

Resume guest

1

2

3

Process the page

Alertuser

?

Problem Client code & data secrecy and integrity vulnerable to attack

EXAMPLES:• CVE-2007-4993. Xen guest root escapes to dom0 via pygrub• CVE-2007-5497. Integer overflows in libext2fs in e2fsprogs. • CVE-2008-0923. Directory traversal vulnerability in the shared folders feature for

VMWare. • CVE-2008-1943. Buffer overflow in the backend of XenSource Xen paravirtualized

frame buffer. • CVE-2008-2100. VMWare buffer overflows in VIX API let local users execute

arbitrary code in host OS. …. [AND MANY MORE]

Page 13: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

13

Hardware

Hypervisor

Management VM Client’s VMs

Traditional cloud computing

Page 14: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

14

SSC: Self-service cloud computing

Hardware

Hypervisor

Management VM Client’s VMs

Page 15: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

15

Main contributions

• New hypervisor privilege model• Enables four new cloud abstractions

– Udom0: Per-client management VMs– Sdom0: System-wide management VM– Service VMs– Mutually-trusted service VMs

• Protocols for trustworthy VM startup• Novel cloud-based services

Page 16: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

16

Duties of the management VM

Manages and multiplexes hardware resources

Manages client virtual machines

Management VM (Dom0)

Page 17: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

17

System-wide Mgmt. VM (SDom0)

Per-Client Mgmt. VM

(UDom0)

Main technique used by SSCDisaggregate the management VM

• Manages hardware• No access to clients VMs

Solves problem #1

• Manages client’s VMs• Allows clients to deploy new services

Solves problem #2

Page 18: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

18

An SSC platform

Hardware

SSC Hypervisor

SDom0

Work VM

Work VM

UDom0

Client’s meta-domain

Service VM

Equipped with a Trusted Platform Module (TPM) chipTrusted Computing Base

Page 19: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

19

Hardware

SSC Hypervisor

SDom0

Work VM

Work VM

UDom0Service

VM

2. Least Privilege1. Separation of Privilege

Page 20: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

Cloud ProviderClient

But providers want some control

• Udom0 and service VMs put clients in control of their VMs

• Sdom0 cannot inspect these VMs• Malicious clients can misuse privilege• Mutually-trusted service VMs

16

NOdata leaks or

corruption

NOillegal activities or

botnet hosting

Page 21: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

21

Trustworthy regulatory compliance

Hardware

SSC Hypervisor

SDom0

Work VM

Work VM

UDom0 Mutually-trusted Service

VM

Page 22: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

22

Traditional privilege model

Privileged operation

Hypervisoris request from Management VM?

YES

ALLOW

NO

DENY

Page 23: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

23

SSC’s privilege modelPrivileged operation

Self-service hypervisorIs the request from client’s Udom0?

NOYES

ALLOW Does requestor have privilege (e.g., client’s service VM)

DENY

NOYES

ALLOW

Page 24: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

24

Hardware

SSC Hypervisor

SDom0

Bootstrap: the Domain Builder

Domain Builder

UDom0Work VM

Service VM

Page 25: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

25

Hardware

SSC Hypervisor

SDom0

Bootstrap: the Domain Builder

Domain Builder

UDom0Work VM

Service VM

Must establish an encrypted

communicationchannel

Page 26: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

26

1

Hardware

SSC Hypervisor

Domain Builder

Udom0 image, Enc ( , )

Udom0

Page 27: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

27

Hardware

SSC Hypervisor

Domain Builder

UDom0

DomB builds domain2

Udom0

Page 28: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

28

Enc ( , )

Hardware

SSC Hypervisor

Domain Builder

UDom0

DomB installs key, nonce3

Page 29: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

29

Hardware

SSC Hypervisor

Domain Builder

UDom0

Client gets TPM hashes4

Page 30: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

30

Hardware

SSC Hypervisor

Domain Builder

UDom0

Udom0 sends to client 5

Page 31: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

31

UDom0

Hardware

SSC Hypervisor

Domain Builder

Client sends Udom0 SSL key6Enc ( )

Page 32: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

32

Hardware

SSC Hypervisor

Domain Builder

UDom0

SSL handshake and secure channel establishment7

Page 33: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

33

Hardware

SSC Hypervisor

Domain Builder

UDom0

Can boot other VMs securely

Work VM

Service VM

8

VM image

Page 34: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

Client meta-domains

Hardware

Malware detection

Firewall and IDS

Storage services

Service VMs

SSC hypervisor

Computation

Work VM

Work VM

Work VM

Udom0

Trustworthy metering

Regulatory compliance

Mutually-trusted

Service VMs

34

Page 35: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

35

Case studies: Service VMs

• Storage services: Encryption, Intrusion detection

• Security services:– Kernel-level rootkit detection– System-call-based intrusion detection

• Data anonymization service• Checkpointing service• Memory dedupication• And compositions of these!

Page 36: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

36

Evaluation• Goals

– Measure overhead of SSC

• Dell PowerEdge R610– 24 GB RAM– 8 XEON cores with dual threads (2.3 GHz)– Each VM has 2 vCPUs and 2 GB RAM

• Results shown only for 2 service VMs– See our CCS’12 paper for more

Page 37: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

37

Storage encryption service VM

Sdom0 Storage encryption service VM

Client’s work VM

Backend Block device

Frontend Block device

Frontend Block device

Backend Block device

Encryption

Decryption

Platform Unencrypted (MB/s) Encrypted (MB/s)

Xen-legacy 81.72 71.90

Self-service 75.88 70.64

Page 38: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

38

Checkpointing service VM

Client’s VM Checkpoint service

Encrypted Storage service

Storage

StorageCheckpoint

service(Encryption)

Platform Unencrypted (sec) Encrypted (sec)

Xen-legacy 1.840 11.419

Self-service 1.936 11.329

Page 39: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

39

Related projects

CloudVisor [SOSP’11] Xen-Blanket [EuroSys’12]

Protect client VM data from Dom0 using a thin, bare-metal hypervisor

Allow clients to have their own Dom0s on commodity clouds using a thin shim

Nested Hypervisor

Client VMDom0

CloudVisor Cloud Hypervisor

Client VM

Client Dom0

XenBlanket

CloudDom0

Page 40: Shakeel Butt shakeelb@cs.rutgers.edu H. Andres Lagar-Cavilla andres@lagarcavilla.org Abhinav Srivastava abhinav@research.att.com Vinod Ganapathy vinodg@cs.rutgers.edu.

40

Current and future work

• Novel network services, e.g., trustworthy network traffic metering

• VM migration in an SSC-based cloud:– Co-location of service VMs and work VMs.– Without exposing details of cloud platform to clients– Pricing and metering issues

• Cloud market model: Service VMs as cloud apps