trust more serverless
play

Trust More, Serverless SysTor2019 Stefan Brenner, June 3rd, 2019 - PowerPoint PPT Presentation

Institute of Operating Systems and Computer Networks Trust More, Serverless SysTor2019 Stefan Brenner, June 3rd, 2019 Technische Universitt Braunschweig, Institute of Operating Systems and Computer Networks Introduction Background


  1. Institute of Operating Systems and Computer Networks Trust More, Serverless SysTor’2019 Stefan Brenner, June 3rd, 2019 Technische Universität Braunschweig, Institute of Operating Systems and Computer Networks

  2. Introduction Background Design & Implementation Evaluation Conclusion Cloud Popularity Impacted by Security Issues Increasing popularity of clouds Cloud security challenges → Hinder cloud adoption Vision: Trusted cloud Enables currently impossible use cases Usage of trusted execution technology June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 2 Institute of Operating Systems and Computer Networks

  3. Introduction Background Design & Implementation Evaluation Conclusion Usage of Trusted Execution Technology Creation of a Trusted Execution Environment (TEE) Goal: Small sensitive compartments inside TEE Holistic approach (legacy applications) Large Trusted Computing Base (TCB) Application partitioning (tailored) High porting effort June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 3 Institute of Operating Systems and Computer Networks

  4. Introduction Background Design & Implementation Evaluation Conclusion Software Design: Monolithic � = Modern Modern modular architectures e.g. micro services, functions Small independent components Clearly defined interfaces Selective scalability Simpler and independent development June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 4 Institute of Operating Systems and Computer Networks

  5. Introduction Background Design & Implementation Evaluation Conclusion Software Design: Monolithic � = Modern Modern modular architectures e.g. micro services, functions Small independent components Trusted FaaS Clearly defined interfaces Trusted serverless or Function-as-a-Service (FaaS) cloud! Selective scalability Simpler and independent development June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 4 Institute of Operating Systems and Computer Networks

  6. Introduction Background Design & Implementation Evaluation Conclusion Trust More, Serverless Background Intel SGX Serverless Computing Design & Implementation Evaluation Conclusion June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 5 Institute of Operating Systems and Computer Networks

  7. Introduction Background Design & Implementation Evaluation Conclusion Intel SGX Serverless Computing Trust More, Serverless Background Intel SGX Serverless Computing Design & Implementation Evaluation Conclusion June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 6 Institute of Operating Systems and Computer Networks

  8. Introduction Background Design & Implementation Evaluation Conclusion Intel SGX Serverless Computing Intel Software Guard Extensions Intel Software Guard Extensions (SGX) Application Enclave CPU instruction set extension for trusted execution Execute Create Enclave “Secure enclaves” inside user processes Transparent memory encryption (with integrity) Execute Remote Attestation via Intel Attestation Service Priviledged System Code Hardware June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 7 Institute of Operating Systems and Computer Networks

  9. Introduction Background Design & Implementation Evaluation Conclusion Intel SGX Serverless Computing Serverless and FaaS Evolution of cloud computing 1. Infrastructure-as-a-Service (IaaS) 2. Platform-as-a-Service (PaaS) 3. Function-as-a-Service (FaaS) – Single standalone functions → Lambdas – Fine-grained accounting, no idle cost – Most maintenance done by provider June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 8 Institute of Operating Systems and Computer Networks

  10. Introduction Background Design & Implementation Evaluation Conclusion Trust More, Serverless Background Intel SGX Serverless Computing Design & Implementation Evaluation Conclusion June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 9 Institute of Operating Systems and Computer Networks

  11. Introduction Background Design & Implementation Evaluation Conclusion Secure Serverless Computing Platform Vision Basic Properties Lambda inside enclave Parallel (competing) Lambda execution Resource efficiency Transparent Lambda attestation Challenges : Selection of suitable programming language and Lambda library support Design of a secure and efficient Lambda execution platform Transparent remote attestation of Lambdas June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 10 Institute of Operating Systems and Computer Networks

  12. Introduction Background Design & Implementation Evaluation Conclusion Secure Serverless Computing Programming Language & Runtime TCB Isolation Sharing Native Multiple Enclaves Process Single Enclave Native Sandbox June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 11 Institute of Operating Systems and Computer Networks

  13. Introduction Background Design & Implementation Evaluation Conclusion Secure Serverless Computing Programming Language & Runtime TCB Isolation Sharing Native Multiple Enclaves Process Native: sandbox? Single Enclave Native Sandbox June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 11 Institute of Operating Systems and Computer Networks

  14. Introduction Background Design & Implementation Evaluation Conclusion Secure Serverless Computing Programming Language & Runtime TCB Isolation Sharing Native Multiple Enclaves Process Native: sandbox? Single Enclave Native Sandbox Interpreted CPython Sub Interpr. June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 11 Institute of Operating Systems and Computer Networks

  15. Introduction Background Design & Implementation Evaluation Conclusion Secure Serverless Computing Programming Language & Runtime TCB Isolation Sharing Native Multiple Enclaves Process Native: sandbox? Single Enclave Native Sandbox CPython: large TCB Interpreted CPython Sub Interpr. June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 11 Institute of Operating Systems and Computer Networks

  16. Introduction Background Design & Implementation Evaluation Conclusion Secure Serverless Computing Programming Language & Runtime TCB Isolation Sharing Native Multiple Enclaves Process Native: sandbox? Single Enclave Native Sandbox CPython: large TCB Interpreted → JavaScript CPython Sub Interpr. JavaScript MuJS Context Duktape Context Google V8 V8 Isolate June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 11 Institute of Operating Systems and Computer Networks

  17. Introduction Background Design & Implementation Evaluation Conclusion Secure Serverless Computing Programming Language & Runtime TCB Isolation Sharing Native Multiple Enclaves Process Native: sandbox? Single Enclave Native Sandbox CPython: large TCB Interpreted → JavaScript CPython Sub Interpr. MuJS: language support JavaScript MuJS Context Duktape Context Google V8 V8 Isolate June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 11 Institute of Operating Systems and Computer Networks

  18. Introduction Background Design & Implementation Evaluation Conclusion Secure Serverless Computing Programming Language & Runtime TCB Isolation Sharing Native Multiple Enclaves Process Native: sandbox? Single Enclave Native Sandbox CPython: large TCB Interpreted → JavaScript CPython Sub Interpr. MuJS: language support JavaScript Duktape: lean TCB MuJS Context Duktape Context Google V8 V8 Isolate June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 11 Institute of Operating Systems and Computer Networks

  19. Introduction Background Design & Implementation Evaluation Conclusion Secure Serverless Computing Programming Language & Runtime TCB Isolation Sharing Native Multiple Enclaves Process Native: sandbox? Single Enclave Native Sandbox CPython: large TCB Interpreted → JavaScript CPython Sub Interpr. MuJS: language support JavaScript Duktape: lean TCB MuJS Context Google V8: high performance Duktape Context Google V8 V8 Isolate June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 11 Institute of Operating Systems and Computer Networks

  20. Introduction Background Design & Implementation Evaluation Conclusion Secure Serverless Computing Programming Language & Runtime TCB Isolation Sharing Native Multiple Enclaves Process Native: sandbox? Single Enclave Native Sandbox Selected Variants: CPython: large TCB Interpreted Pure JavaScript Lambdas on Duktape and Google V8. → JavaScript CPython Sub Interpr. MuJS: language support JavaScript Duktape: lean TCB MuJS Context Google V8: high performance Duktape Context Google V8 V8 Isolate June 3rd, 2019 Stefan Brenner Trust More, Serverless Page 11 Institute of Operating Systems and Computer Networks

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend