A Lightweight Secure Cyber Foraging Infrastructure for - - PowerPoint PPT Presentation

a lightweight secure cyber foraging infrastructure for
SMART_READER_LITE
LIVE PREVIEW

A Lightweight Secure Cyber Foraging Infrastructure for - - PowerPoint PPT Presentation

A Lightweight Secure Cyber Foraging Infrastructure for Resource-Constrained Devices Sachin Goyal and John Carter School of Computing University of Utah 1 Todays Computing Environments Small, embedded, mobile devices Ubiquitous


slide-1
SLIDE 1

1

A Lightweight Secure Cyber Foraging Infrastructure for Resource-Constrained Devices

Sachin Goyal and John Carter School of Computing University of Utah

slide-2
SLIDE 2

2

Today’s Computing Environments

Small, embedded,

mobile devices

Ubiquitous network

connectivity

slide-3
SLIDE 3

3

Today’s Computing Environments

Small devices =

resource - constrained

– Limited compute power, memory, storage, battery

Can we overcome these

resource constraints?

slide-4
SLIDE 4

4

Cyber Foraging or Surrogate Computing

Enhancing capability of devices with help

from powerful computers in environment

subtask subtask

` Network

slide-5
SLIDE 5

5

Example: Speech Recognition

Slow response (~minutes) High battery utilization

Local Speech Recognition

slide-6
SLIDE 6

6

Example: Speech Recognition

Cyber Cyber-

  • foraged

foraged `

speech Speech recognition Recognized string Surrogate Network

Real-time response Battery consumption: orders of magnitude lower

slide-7
SLIDE 7

7

`

A Smart Home/Office Environment

PDA Wall-powered Embedded Device (Inside a box) Network Wireless Sensor Surrogate

slide-8
SLIDE 8

8

This Talk’s Focus

Enable cyber foraging on trusted computers

already owned by users

– Lightweight but flexible infrastructure for clients – Surrogate design based on virtual machines – Security – Surrogate located across Internet (e.g., home PC)

Speech recognition : 170x improvement in

response time, 60x in energy consumption

slide-9
SLIDE 9

9

Related Work

Spectra / Chroma from CMU

– Based on Coda – Remote data storage + remote execution

Xenoservers from Cambridge

– A platform for wide area distributed computing – e.g., utility computing, server on demand – Uses virtual machines based on their Xen work

slide-10
SLIDE 10

10

Our Cyber Foraging Infrastructure

Lightweight for client – no heavy middleware Surrogate: based on virtual machine (VM)

technology

– Isolation – Resource control – Flexibility – Easy cleanup

`

Virtual

slide-11
SLIDE 11

11

Our Cyber Foraging Infrastructure

Two flavors of virtual machines

– Xen (para-virtualized x86) – Linux Vserver: based on encapsulation of processes in groups through a modified kernel

Client gets complete virtual server

– Root access – Unique IP address – Clean disk image of a distribution (e.g. redhat9)

slide-12
SLIDE 12

12

Control Flow

Virtual

`

1 2 5 3 4 6

Service Discovery Server Client Surrogate

Service Discovery Request: based on attribute

  • matching. Attributes represented in XMLish notation

Service Discovery Response – client gets IP address, port number of surrogate Service Start Request: client contacts surrogate manager to request a virtual server Surrogate manager checks if client is authorized; if so, starts a new virtual server Service Start Response: returns IP address of the virtual server to client Client directly contacts virtual server to invoke subtask

  • e.g., speech recognition back-end
slide-13
SLIDE 13

13

Authentication Subsystem

`

device public key

Authorized List

ssh-rsa AAAAB3Nyc2E… ssh-rsa AAA33221y3D…

Virtual copy public key ssh client surrogate TLS If yes, start a virtual server, and copy the key to /root/.ssh/authorized_keys file Result: client can directly ssh to virtual server

slide-14
SLIDE 14

14

User Certified Devices

User

` `

User Computer signs signs public key

Authorized List

ssh-rsa AAAAB3Nyc2E… ssh-rsa AAA33221y3D…

Surrogate Now all the devices are authorized to use the surrogate Each Device has their own public-private key.

slide-15
SLIDE 15

15

User Certified Devices

Authorized List

ssh-rsa AAAAB3Nyc2E… ssh-rsa AAA33221y3D…

`

Surrogate device public key + user public key + certificate Surrogate verifies the certificate and checks if user public key exists in authorized list

slide-16
SLIDE 16

16

Invoking client’s task on virtual server

Client sends script URL through ssh Virtual server manager downloads and

executes the script

Script downloads, installs, and runs

required programs

slide-17
SLIDE 17

17

Experimental Evaluation

Zaurus SL-5500 PDA and Dell 2.4GHz P4

computer with 512 MB of RAM

Two applications

– Sphinx speech recognition from CMU – Synthetic data mining application

Two networks:

– University of Utah: surrogate on LAN, client connected using 802.11b (2-3 msec RTT) – Home on broadband Internet: client connected using 802.11b (72-73 msec RTT to surrogate)

slide-18
SLIDE 18

18

Virtual Server Start and Application Install Experiments

Average response time for allocating and initializing a virtual server Client location Client location Linux Linux-

  • Vserver

Vserver Xen Xen

Univ 4.22s 12.43s Home 4.41s 12.57s

Average response time for instantiating the Sphinx Sphinx speech recognition engine Client location Client location Linux Linux-

  • Vserver

Vserver Xen Xen

Univ .37s .30s Home .78s .74s

slide-19
SLIDE 19

19

Sphinx Speech Recognition

Local – too slow for real time Cyber foraged: real time as well as low battery

utilization (even from home)

Type Type Client Client location location Response Response time time CPU CPU Util Util Memory Memory Util Util App App Size Size Battery Battery util util

local

  • 117.49s

>95% 51.6- 55.9% 23MB 1.1% University 0.59 -0.69s .018% 0.3- 0.5% 1.1% 12KB cyber foraged Home 2.24 -2.31s .083%

  • Recognition of pre-recorded utterance “Go

Forward 10 meters” (44 KB) 170x 50x 61x 13x

slide-20
SLIDE 20

20

Synthetic Data Mining Benchmark

Download three 6.3 MB files, compute MD5

checksum

Client and surrogate on same LAN More improvements possible using network

card sleep modes

Type Type Response time Response time Battery Battery

Local 61.47s 1.5% Cyber foraged 2.9s (20x) 0.06% (25x)

slide-21
SLIDE 21

21

Conclusion

Describe design and implementation of

cyber-foraging system based on virtual machine technology

Great potential to reduce response time and

energy consumption

Useful even for surrogate across the Internet

slide-22
SLIDE 22

22

Future Work

Security, trust, and economic models for using

surrogates in untrusted environment

– Presenting at WORLDS workshop this Sunday

Service discovery – better requirement matching,

load balancing

More applications Ease of use