Cloud

Department of Computer Science | Institute of Systems Architecture | Chair of Computer Networks
FlexCloud: Reliable and Secure
Cloud Overlay Infrastructures
Prof. Dr. Alexander Schill
2013
Outline
Cloud Computing …
• What is it all about?
• Problems
• π-Box: Building your personal secure cloud
• π-Data Controller: Secure Cloud Storage
• Conclusion & Future Work
#3
The shape of a cloud …
… is in the eye of the beholder.
IaaS/PaaS*
Cloud Operating System,
part of Azure Platform
SaaS*
Customized applications
for business and home
user, based on Google
App Engine, e.g.
collaboration tools
*
IaaS*
Migration of virtual
machines between private
and public clouds
SaaS = Software as a Service
PaaS = Platform as a Service
IaaS = Infrastructure as a Service
PaaS*
SaaS/PaaS*
Development and hosting
of web applications
Business cloud services
focussing on customer
relationship management
#4
Cloud Computing Characteristics
Cloud Computing is …
On-demand
self service
Rapid elasticity
… the on-demand and
pay-per-use application of
virtualised IT services
over the Internet.
Broadband network
access
Measured and
optimized service
Resource pooling
Adopted from the NIST Definition of Cloud Computing [MeGr2011]
#5
Service & Deployment Models
Cloud Architecture Stack
Cloud Organization
User/Clients
Machine
Interface
Applications Services
Software Services (SaaS)
Components
Services
Programming Environment
Execution Environment
Platform Services (PaaS)
Compute
Network
Storage
Convenience
Applications
Public
Hybrid
Community
Private
Virtual Resource Set (VRS)
Infrastructure Services (IaaS)
User Control
Adopted from [MeGr2011] and [BKNT2010]
User Interface
Physical Resource Set (PRS)
#6
Cloud Computing …
• What is it all about?
• Problems
• π-Box: Building your personal secure cloud
• π-Data Controller: Secure Cloud Storage
• Conclusion & Future Work
#7
Problems of Cloud Computing
Reliability and security when giving up physical possession
> Failure of monocultures
> Cloud providers‘ trustworthiness
> Staying in control
#8
FlexCloud Objectives
π-Cloud: Establishing a secure cloud computing life cycle
Hybrid cloud platform to integrate a user’s (cloud) resources,
services and data.
> Unified Cloud
Prevent Vendor-Lock-in + Integration of existing IT
> Secure Cloud
Ensure data privacy and security
> Managed Cloud
Keep the user in command
> Efficient Cloud
Adapt to user preferences and cloud's vital signs
#9
Cloud Computing …
• What is it all about?
• Problems
• π-Box: Building your personal secure cloud
• π-Data Controller: Secure Cloud Storage
• Conclusion & Future Work
# 10
FlexCloud's Approach
Subsume all end devices within a Personal Secure Cloud
(π-Cloud) controlled by the π-Box.
π-Cloud
π-Box
# 11
Transparent Encryption
Document classification concerning
security requirements.
Analysis of structured,
unstructured data and
context information
Addressee identification and
derivation of respective keys.
π-Cloud
PKI
?
# 13
Cloud Computing …
• What is it all about?
• Problems?
• π-Box: Building your personal secure cloud
• π-Data Controller: Secure Cloud Storage
• Conclusion & Future Work
# 15
Increasing Availability: from RAID to RAIC
RAIC:
RAID:
Redundant Array of Independent Disks
Redundant Array of Independent Clouds
Integration Layer
Integration Layer
Distributed
file system
Logical partition
Web
access
Versioning
Preprocessing Layer
File level transformation
(e.g. compression)
Preprocessing Layer
RAID level redundancy
routine (mirror, stripe, …)
Transport Layer
Block resources
Dispersal routine
Reliable
Unreliable,
disk
low
storage
quality
hard disk
Unreliable,
Reliable,
proprietary
universal
andand
secure
insecure
cloud
storage
cloud
storage
Fragment level transformation
(e.g. encryption)
Transport Layer
Caching
Local persistence
Provider Storage API adapter
# 16
Secure Cloud Storage Integrator for
Enterprises (System Architecture)
π-Cloud =
Cloud Storage
Protocol Adapter
File Dispersion
Shared Folder
CIFS
Cryptography
Meta Data
Company Intranet
API
FTP
π-Data Controller
# 17
Storing Files (1/5)
π-Cloud =
Cloud Storage
Protocol Adapter
File Dispersion
Shared Folder
Cryptography
Meta Data
Company Intranet
π-Data Controller
# 18
Implementation of the Shared Folder
./xmp /tmp/fuse
ls - /tmp/fuse
libfuse
glibc
glibc
User space
Kernel
FUSE
VFS
NFS
Ext3
…
CIFS =
Ext3 =
FUSE =
glibc =
Common Internet File System
Third Extended File System
Filesystem in Userspace
GNU C library
NFS = Network File System
SMB = Server Message Block
VFS = Virtual File System
• Technology: FUSE
(Filesystem in Userspace)
• CIFS/SMB network share on
proxy file server
• Unified user interface for
arbitrary cloud storage
services
• Utilizing CIFS access control
mechanisms
# 19
Storing Files (2/5)
π-Cloud =
Cloud Storage
Protocol Adapter
File Dispersion
Shared Folder
Cryptography
Meta Data
Company Intranet
π-Data Controller
# 20
File Dispersion
Ensure availability despite of
unreliable cloud storage providers …
k
threshold, i.e.
# of necessary
shares to
reconstruct
E.g. k=6, n=8
n
total # of
shares a file
is split into
If k < n, we need
redundant information.
# 21
Secret Sharing aka Threshold Schemes
Objective:
Divide a secret 𝑠 ∈ 𝑆 in 𝑛 shares 𝑠1 , … , 𝑠𝑛 with
1. Knowledge of any 𝑘 or more 𝑠𝑖 shares makes 𝑠 easily computable.
2. Knowledge of any 𝑘 − 1 or fewer 𝑠𝑖 shares leave 𝑠 completely
undetermined (in the sense that all its possible values are equally
likely).
Sharing
Reconstruction
Input: 𝑠
Dealer
si 1
Share holders
store
Share holders
…
Reconstructor
…
𝑠1
𝑠2
si k
𝑠𝑖2
𝑠𝑛
Output: 𝑠
∗
# 22
Secret Sharing:
An informal example with 2 shares
Visual Cryptography
[NaSh1994]
Simplification: n = k = 2
[Source: http://goo.gl/watJC]
Secret cannot be determined independently!
… revealed!
# 23
Secret Sharing: More formalism
Blakley's scheme [Blakley1979]
Idea:
Any n nonparallel n-dimensional hyper-planes intersect at a specific point.
Sharing:
Recovering:
Encode the secret as any single coordinate of the point of intersection.
1. Calculating the planes' point of intersection.
2. Take a specified coordinate of that intersection.
Example:
n≥3, k=3
1 share available
Shamir's scheme
2 shares available
3 shares available
[Shamir1979]
It takes k points to define a polynomial of degree k-1.
Be a0:=s є S the secret to be shared where S is an
infinite field known to all share holders.
Randomly choose (k-1) coefficients a1,a2,…ak-1 є S to
build f(x):=Σai·xi.
Calculate shares sj:=[j,f(j)] with j є ℕn.
Recovering: Use Lagrange interpolation to find coefficients of the
polynomial including constant term a0.
Graphics taken from Wikipedia.
Idea:
Sharing:
s2
s1
s
s3
# 24
Information Dispersal:
Computationally secure secret sharing
Rabin's scheme [Rabin1989]
• Guarantees only availability but no secrecy.
• Construction
Be 𝑎𝑖 ≔ 𝑠 ∈ 𝑆 where 𝑖 = 1, … , 𝑘, i.e. 𝑓 𝑥 ≔
Rest as with Shamir's secret sharing.
𝑘
𝑖=1 𝑠
∙ 𝑥𝑖.
• Properties
•
With a polynomial and shares of the same size as before, we can now
share a value 𝑘 times as long as before.
•
Length of each share is only -th of the length of the secret, and
𝑘
if 𝑘 shares must be sufficient for reconstruction, one can obviously
not get shorter.
➔ Space optimal
•
However, one might gain some information if he gets access to
several shares.
➔ Computationally secure
1
More efficient information dispersal schemes
• Need to be maximum distance separable to use 𝑘 arbitrary
shares for reconstruction.
• Examples: Cauchy-Reed-Solomon, Liberation, Blaum-Roth [PSS2008]
# 25
Storing Files (3/5)
π-Cloud =
Cloud Storage
Protocol Adapter
File Dispersion
Shared Folder
Cryptography
Meta Data
Company Intranet
π-Data Controller
# 26
Cryptography: Confidentiality & Integrity
AES-CBC
+ SHA256
AES-CBC
+ SHA256
AES-CBC
+ SHA256
AES-CBC
+ SHA256
# 27
Storing Files (4/5)
π-Cloud =
Cloud Storage
Protocol Adapter
File Dispersion
Shared Folder
Cryptography
Meta Data
Company Intranet
π-Data Controller
# 28
Storing Files (5/5)
Stored Meta Data per component
•
Shared Folder:
General file system information, e.g. file size, access rights …
•
File Dispersion:
Used dispersion algorithm/parameters (n, k), shares‘ locations
•
Cryptography:
Used cryptographic keys and calculated checksums per share
•
Cloud Storage
Protocol Adapter:
Storage protocol parameters and provider login data
π-Cloud =
Cloud Storage
Protocol Adapter
File Dispersion
Shared Folder
Cryptography
Meta Data
Company Intranet
π-Data Controller
# 29
Retrieving Files (1/3)
Dispersion parameters: n=6
π-Cloud =
Cloud Storage
Protocol Adapter
File Dispersion
Shared Folder
Cryptography
Meta Data
Company Intranet
π-Data Controller
# 30
Retrieving Files (2/3)
Dispersion parameters: n=6, k=3
π-Cloud =
Cloud Storage
Protocol Adapter
File Dispersion
Shared Folder
Cryptography
Meta Data
Company Intranet
π-Data Controller
# 31
Retrieving Files (3/3)
π-Cloud =
Cloud Storage
Protocol Adapter
File Dispersion
Shared Folder
Cryptography
Meta Data
Company Intranet
π-Data Controller
# 32
Prototype Implementation
[SGS11]
web interface for π-Cockpit
[SBM+11]
π-Cockpit desktop application
ResUbic Cloud Storage Allocator
for Cyber Physical Systems
# 33
Performance Evaluation Upload
Test case
π-Box used
# local storage
# cloud storage
# encrypted shares
1
No
0
1
0
2
Yes
0
1
0
3
Yes
8
0
0
4
Yes
4
4
4
5
Yes
0
8
8
File size: 24 MB; Dispersion parameters: n=8, k=6;
Cryptography parameters: Towards
AES (256
bit,Centric
14 iterations),
SHA256;
User
Data Governance
and Control in the Cloud
Network Up/Downlink: 10/20 Mbit/s
# 34
Performance Evaluation Download
Test case
π-Box used
# local storage
# cloud storage
# encrypted shares
1
No
0
1
0
2
Yes
0
1
0
3
Yes
8
0
0
4
Yes
4
4
4
5
Yes
0
8
8
File size: 24 MB; Dispersion parameters: n=8, k=6;
Cryptography parameters: Towards
AES (256
bit,Centric
14 iterations),
SHA256;
User
Data Governance
and Control in the Cloud
Network Up/Downlink: 10/20 Mbit/s
# 35
Cloud Computing …
• What is it all about?
• Problems?
• π-Box: Building your personal secure cloud
• π-Data Controller: Secure Cloud Storage
• Conclusion & Future Work
# 37
Results so far & future work (π-Data Controller)
• Integration of existing cloud storage services (Cloud-of-Clouds)
• Proxy server for transparent mediation
➔ easy to use for end-user, common scheme for enterprises
• Good performance, high security & data control for the user
•
•
•
•
•
Data store for database system (block-based dispersion)
Collaboration scenarios, file sharing, access by external entities
Securing the meta data database
Automatic classification of data
Improving performance, e.g. scheduling algorithms,
caching/prefetching, parallelization
• Optimized cloud storage
# 38
Towards a secure cloud life cycle
Cloud Adaption and Optimization
Strategies for the compensation of
SLA violations
Strategies for minimization of
energy consumption
Mechanisms for the visualization of complex Cloud
Monitoring data
Cloud Surveillance
and Incident Detection
Specification of monitoring
targets and SLA violations
Models for the proactive recognition of
SLA violations and the evaluation of a
Cloud‘s energy efficiency
Mechanisms for reliable distributed Monitoring
Fine-grained Service Level Agreements
Methods to determine fine-grained nonfunctional properties of Cloud Services
Identification of assets and
corresponding requirements
Deduction of monitoring
targets from SLAs
Dynamic Provider
Selection and Cloud Setup
Flexible distribution mechanisms for
Cloud Platforms
Strategies for the performance optimization of
Cloud Applications
Reputation consideration to improve reliability
and trustworthiness
# 40
Tomorrow's forecast:
still cloudy but sunny spots
Contact:
[email protected]
[email protected]
http://flexcloud.eu/
# 41
References
[BKNT2010]
C. Baun, M. Kunze, J. Nimis and S. Tai: Cloud Computing. Web-basierte
dynamische IT-Services. Springer Verlag, 2010.
[Blakley1979]
G. R. Blakley: Safeguarding cryptographic keys; AFIPS Conference
Proceedings Vol. 48, National Computer Conference (NCC) 1979, 313-317.
[MeGr2011]
P. Mell and T. Grace: The NIST Definition of Cloud Computing. NIST Special
Publication 800-145, September 2011.
[NaSh1994]
M. Naor and A. Shamir, Visual Cryptography , Eurocrypt 94.
[PSS2008]
J. S. Plank, S. Simmerman, C. D. Schuman: Jerasure: A Library in C/C++
Facilitating Erasure Coding for Storage Applications – Version 1.2. Technical
Report CS-08-627, University of Tennessee, 2008.
[Rabin1989]
M. O. Rabin: Efficient Dispersal of Information for Security, Load Balancing,
and Fault Tolerance; Journal of the ACM 36/2 (1989) 335-348.
[SBM+2011]
J. Spillner, G. Bombach, S. Matthischke, R. Tzschicholz, and A. Schill:
Information Dispersion over Redundant Arrays of Optimal Cloud Storage for
Desktop Users. In: IEEE International Conference on Utility and Cloud
Computing. Melbourne, Australien, December 2011.
[SGS2011]
R. Seiger, S. Groß, and A. Schill: A Secure Cloud Storage Integrator for
Enterprises. In: International Workshop on Clouds for Enterprises.
Luxemburg, September 2011.
[Shamir1979]
A. Shamir: How to Share a Secret; Communications of the ACM 22/11
(1979) 612- 613.
# 42