trusted end host monitors for securing cloud datacenters
play

Trusted End Host Monitors for Securing Cloud Datacenters Alan Shieh - PowerPoint PPT Presentation

Trusted End Host Monitors for Securing Cloud Datacenters Alan Shieh Srikanth Kandula Albert Greenberg Cloud workload is dynamic and hostile Traditional datacenters Cloud datacenters Infrastructure supports small # of


  1. Trusted End Host Monitors for Securing Cloud Datacenters Alan Shieh †‡ Srikanth Kandula ‡ Albert Greenberg ‡ † ‡

  2. Cloud workload is dynamic and hostile Traditional datacenters Cloud datacenters Infrastructure supports small # of Infrastructure is shared among internal clients many untrusted tenants – Software and topology change slowly – Rapidly changing config – Can exploit natural network – Chokepoints torque network chokepoints topology – Feasible to audit app code – Too many apps to audit! • Scaling requires more agility & flexibility • Exploits more likely • Exploits can use cloud resources to do more damage • Attack other tenants • External/internal DoS Need new approach

  3. Insight: Cloud datacenters can help! • Cloud data centers tend to be: – Centrally controlled – Homogeneous hardware & software • Clean slate feasible – Have strongly isolated, trusted functionality • VMs, TPMs, management coprocessors • Our approach: Trust end host monitors Push enforcement from network to end hosts – Distributed across many hosts – Runs in trusted layers

  4. In-network enforcement OS OS Hypervisor Hypervisor DoS protection Allow to OS OS Firewall Deep Packet Inspection Appliance Hypervisor Hypervisor Trusted component

  5. Trusted end host monitors Central Controller OS OS Hypervisor Hypervisor DoS protection DoS protection Trusted NIC Trusted NIC Allow to Allow to Shutoff OS Trusted Hypervisor DoS protection Alarm Trusted component Trusted NIC Allow to

  6. Summary • Cloud DCs have unique challenges & opportunities – Address, exploit these with trusted end host monitors • Runs on commodity network & end host hardware – Simplifies controller design – Improves scalability – Reduces cost • Status: Built prototype from VMs, trusted NIC (Intel AMT)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend