1
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
Presenter: Charles Kamhoua, Ph.D. Air Force Research Laboratory - - PowerPoint PPT Presentation
Game Theoretic Modeling of Security and Interdependency in a Public Cloud Presenter: Charles Kamhoua, Ph.D. Air Force Research Laboratory Cyber Assurance Branch April 2, 2014 Collaborators: Kevin Kwiat (AFRL/RIGA) Joon S. Park (Syracuse
1
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
2
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
3
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
Source: http://www.free-pictures-photos.com/
4
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
Peter Mell, Timothy Grance, “The NIST Definition of Cloud Computing”, NIST Special Publication 800-145, 2011
5
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
6
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
7
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
8
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
Leakage in Third-Party Compute Clouds,” In the proceedings of the 16th ACM Conference on Computer and Communications Security, CCS’09, Chicago, IL, USA, October 2009.
Analysis Techniques,” in the proceedings of the 2012 ACM Cloud Computing Security Workshop (CCSW) in conjunction with the 19th ACM Conference on Computer and Communications Security, October 2012, Raleigh, North Carolina, USA.
9
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
10
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
11
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
12
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
13
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013 Application 1 Operating System 1 Operating System 2 Operating System n Virtual Machine 1 Hardware Hypervisor Virtual Machine 2 Virtual Machine n Application 1 Application k Application k Application 1 Application k User 1 User 2 User n
14
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
Attack i User j I N User i I { ¡𝑆−𝑓−𝑟↓𝐽 𝑀↓𝑗 ;
{ ¡ 𝑆−𝑓− 𝑟↓𝐽
N { ¡𝑆−𝑟↓𝑂 𝑀↓𝑗 ;
{ ¡ 𝑆 − 𝑟 ↓ 𝑂
Attack j User j I N User i I { ¡ 𝑆−𝑓− 𝑟↓𝐽 𝜌
{ ¡ 𝑆−𝑓− 𝑟↓𝑂 𝜌
N { ¡𝑆−𝑟↓𝐽 𝜌𝑀↓𝑗 ;
{ ¡𝑆−𝑟↓𝑂 𝜌𝑀↓𝑗 ;
Symbol Notation
Probability of a successful attack on a user given that he has invested in security
Probability of a successful attack on a user given that he has not invested in security π Probability that the hypervisor is compromised given a successful attack on a user R User reward from using the cloud computing services e Total expense required to invest in security i User i j User j
User i’s expected loss from a security breach
User j’s expected loss from a security breach I User’s strategy “Invest” N User’s strategy “Not invest”
Attacker’s strategy “launch an attack on User i”
15
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
16
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0.05 0.1 0.15 0.2 0.25 0.3 Changes in User j's Payoff with Probability pi Probability pi User j's Payoff Mixed Nash equilibrium Pure Nash equilibrium
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 Probability pi User j's Payoff Changes in User j's Payoff with Probability pi Mixed Nash equilibrium Pure Nash equilibrium
17
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4
0.1 0.2 Changes in User j's Payoff with the Expense in Security e Expense in Security e User j's Payoff
0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4
0.2 0.4 0.6 0.8 Changes in User j's Payoff with the Expense on Security e Expense on Security e User j's Payoff Changes in mixed Nash equilibrium
18
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
2 4 6 8 10 12 14
0.5 1 Changes in User j's Payoff with his Loss from Security Breach Lj User j's Loss from Security Breach Lj User j's Payoff Mixed Nash equilibrium Pure Nash equilibrium Mixed Nash equilibrium
2 4 6 8 10 12 14
1 2 3 4 Changes in User j's Payoff with his Reward from Using the Cloud User j's Loss from Security Breach Lj User j's Payoff Reward=4.4 Reward=1.2
19
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
20
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
21
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013
22
Approved for Public Release; Distribution Unlimited: 88ABW-2013-5145 Dated 9 DEC 2013