towards supercloud computing
play

Towards Supercloud Computing: User-Centric Security Management for - PowerPoint PPT Presentation

Towards Supercloud Computing: User-Centric Security Management for Clouds of Clouds Marc Lacoste Orange Labs SEC2 ComPAS15 Workshop on Cloud Security Lille, June 30, 2015 Cloud Security Today Security = key concern in cloud adoption for the


  1. Towards Supercloud Computing: User-Centric Security Management for Clouds of Clouds Marc Lacoste Orange Labs SEC2 ComPAS’15 Workshop on Cloud Security Lille, June 30, 2015

  2. Cloud Security Today Security = key concern in cloud adoption for the enterprise market  Threats are on the rise Source: Cloud Security Alliance, 2013.  Attacks are costly Source: Ponemon, 2013.  Awareness is growing, but is not enough

  3. The Cloud everywhere, increasingly complex …

  4. …and so are security breaches! Classical cloud threats… Secure, Robust SDN NFV Security …  Root causes: commodity hardware,  Challenges: central PoF, trust and cloud isolation technology  Mitigation:  Issues:  Replication, diversity, authentication  Topology validation new threats  Policy consistency, secure SDN toolkits  Availability of management network  Intrusion prevention?  Secure boot ...  Fault tolerance?  I/O partitioning  Performance isolation

  5. Hasn’t someone been forgotten? The User? The Customer?  Are they going to use those infrastructures?  Are they going to pay for them?

  6. Provider-centric clouds prevent interoperability and unified control The Cloud as utility Multi-provider clouds Promise: high availability & security , NOT ACHIEVED energy efficiency, scalability , … Feature-rich services: intrusion NOT DEPLOYED monitoring, elastic load balancing, … INTEROPERABILITY S  Vendor lock-in E  Different SLAs C Provider-centric U cloud UNIFIED CONTROL R deficiencies  Heterogeneous I infrastructure services T  Monolithic infrastructure  Technological choices Y

  7. Outline  Moving to User-Centric Cloud Security  Secure Supercloud Computing  11 Key Enabling Technologies  The H2020 SUPERCLOUD Project  Next Steps

  8. User-centric clouds require a resource distribution layer

  9. Customer Security Expectations

  10. Taking Into Account Security Challenges Infrastructure security: strong, flexible, automated security for compute resources  Vulnerabilities in complex infrastructure, mitigation of cross-layer attacks  Lack of flexibility and control in security management  Automation of security management: in layers, between providers Data management: on-demand, unified experience in protection of data assets  Management of access rights, continuum between provider vs. user control  Blind compute over data stored in multi-clouds  Traceability of information for accountability and privacy Network management: resilient, secure virtual networking  Resilient resource provisioning across heterogeneous clouds  End-to-end inter-cloud network security with different security SLAs

  11. Outline  Moving to User-Centric Cloud Security  Secure Supercloud Computing  11 Key Enabling Technologies  The H2020 SUPERCLOUD Project  Next Steps

  12. Secure Supercloud Computing The Supercloud NORTH INTERFACE provides user-centric self-service security & dependability The Supercloud SOUTH INTERFACE provides provider-centric self-managed security & dependability

  13. Supercloud Computing: Self-Service Security Self-service security relies on: Abstraction & Policies Control Layer  a distributed, flexible resource & control layer spanning compute, data, network  multi-provider security policies

  14. Supercloud Computing: Self-Managed Security Security and Trust Self-managed security relies on: management  bi-dimensional (cross-layer, multi-provider) self-protection for compute and network resources  bi-dimensional trust management

  15. Supercloud Computing: End-to-End Security E2E network E2E VM SLAs security End-to-end security relies on:  E2E security SLAs for VMs & data protection  E2E network security in control and data planes E2E data E2E network security security

  16. Supercloud Computing: Resilience Resilience Resilience relies on:  multi-cloud data availability  resilient networking in data and control plane Resilience Resilience

  17. Outline  Moving to User-Centric Cloud Security  Secure Supercloud Computing  11 Key Enabling Technologies  The H2020 SUPERCLOUD Project  Next Steps

  18. Key Enabling Technologies: Self-Service Security Flexible hypervisor security architectures:  User data isolation + protection against the cloud provider  Modular, secure interface for the hypervisor Blind computation:  Lightweight homomorphic operations over encrypted data  Advanced cryptographic tools for data security Security SLA management:  Security SLA (SSLA) language bridging the gap between layers  SSLA templates and combination functions for easy specification

  19. Key Enabling Technologies: Self-Managed Security Autonomic IaaS security supervision:  Cross-layer security monitoring, even if some layers are compromised  Cross-provider security monitoring, seamless integration Security policies:  Flexible security policy languages and deployment tools  Policy negotiation tools for conflict resolution Network security management:  Finer-grained network control than current specifications  SDN components/APIs for advanced policy monitoring

  20. Key Enabling Technologies: End-to-End Security Cryptographic protection:  Integrity and consistency verification  Processing cryptographically protected data Storage access control:  Transparent cryptographic protection mechanisms  Flexible cloud-based key management Trust management:  Horizontal trust management between different cloud entities  Vertical trust management across cloud system configurations  Abstraction of trust through specification language

  21. Key Enabling Technologies: Resilience SDN Resilience:  Secure, dependable SDN controller for multi-cloud networking  Intra/inter-cloud infrastructure resilient to network failures Data availability:  Integration of disruptive secrecy technology to multi-cloud storage replication  New services based on multi-cloud storage algorithms  Adaptive multi-cloud algorithms with outstanding performance for real workloads

  22. What is VESPA? = Virtual Environments Self-Protecting Architecture An automated security supervision framework for IaaS and multi-DC infrastructures Design principles STRONG SECURITY  Cross-layer security: detect / respond to overall extent of attack.  Open architecture: mitigate new threats, integrate legacy counter-measures. SIMPLE E SECURITY  Automated security supervision: choose in-layer, cross-layer, multi-DC.  Tuneable defense patterns: orchestrate multiple loops for rich defense strategy. CLOUD PROVIDER CUSTOMERS  Anti-malware. APPLICATION ONS  Anti-DDoS. IaaS monitoring SecaaS  End-to-end security. appliances

  23. VESPA System Architecture Resource Security Agent Orchestration Plane Plane Plane Plane DETECTION HO Detection Manager VM Detection Agent DECISION Hypervisor REACTION VO Reaction Manager Reaction Agent Physical HO RESOURCES

  24. VESPA System Architecture Resource Security Agent Orchestration Plane Plane Plane Plane Intra-Layer Self-Protection DETECTION HO Detection Manager VM Detection Agent DECISION Hypervisor REACTION VO Reaction Manager Reaction Agent Physical HO RESOURCES

  25. VESPA System Architecture Resource Security Agent Orchestration Plane Plane Plane Plane Cross-Layer DETECTION Self-Protection HO Detection Manager VM Detection Agent DECISION Hypervisor REACTION VO Reaction Manager Reaction Agent Physical HO RESOURCES

  26. The VESPA Project RESULTS LTS CURRENT T VESPA FUNCTI TION ONALITI ALITIES So far VESPA = core + security plug-ins.  Framework: supervision of single Supporte ted In progres ess cloud and multi-DC security. Anti-virus Integration with Heat + Horizon Available in open source . Hypervisor control Network zones  Different applications demonstrating Firewall vSwitch management (SDN) viability of self-defending cloud concept. Log analysis  Research results :  Framework [ICAC’12 ] . .  Extensions:  Network management (SDN approach).  Mobile cloud SLAs: Orange MC2 [UCC’13].  VMM self-protection: KungFuVisor [EURODW’12], self -stabilization [DSS’14].  Keynotes [SSS’11], panels [IM’11, NOMS’14], tutorials [ICAR’13, MOBILECLOUD’14].  Code available at : https://github.com/Orange-OpenSource/vespa-core

  27. Outline  Moving to User-Centric Cloud Security  Secure Supercloud Computing  11 Key Enabling Technologies  The H2020 SUPERCLOUD Project  Next Steps

  28. The SUPERCLOUD Project 28

  29. The SUPERCLOUD Project: Goals and Expected Results Goal: a security management infrastructure for secure supercloud computing Expected Results: A security management infrastructure:  360 ° autonomic security supervision , horizontally and vertically for superclouds  A user-centric to provider-centric continuum of security services  End-to-end trust management A data management framework:  Advanced cryptographic tools (e.g., access control, secure computation)  A resilience framework for multi-cloud storage infrastructures A multi-cloud network management infrastructure:  Resilient virtual network provisioning across multiple clouds  Sanitized network environment with tunable security guarantees

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend