1 / 16

Team Members Reehan Ahmed Khan IL (MT2009046) Shweta M (MT2009072) Rishabh Namdeo (MT2009094)

Provable Security Under Virtualization. Team Members Reehan Ahmed Khan IL (MT2009046) Shweta M (MT2009072) Rishabh Namdeo (MT2009094) Aditya Pendyala (MT2009105) G Md Nabi Saheb (MT2009130). Earlier Days…. “One server, One application” Server resources were underutilized.

barbra
Télécharger la présentation

Team Members Reehan Ahmed Khan IL (MT2009046) Shweta M (MT2009072) Rishabh Namdeo (MT2009094)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Provable Security Under Virtualization • Team Members • Reehan Ahmed Khan IL (MT2009046) • Shweta M (MT2009072) • Rishabh Namdeo (MT2009094) • Aditya Pendyala (MT2009105) • G Md Nabi Saheb (MT2009130)

  2. Earlier Days….. • “One server, One application” • Server resources were underutilized. • Too much time spent on Server maintenance. • Then came Virtualization Provalbe Security Under Virtualization

  3. VIRTUALIZATION • Provides • Abstraction • Different Operating Systems on same hardware. • Cost Effectiveness • Application provisioning , maintenance, high availability and disaster recovery. • The concept of virtualization resulted in isolation & duplication of real machine – Virtual Machine. • There was a need to monitor VMs and thus came the concept of hypervisor. Provalbe Security Under Virtualization

  4. HYPERVISOR • Virtual Machine Monitor • Monitors memory usage and disk usage of Guests OSs. • 2 types • Type 1(native) - run directly on the host’s hardware. • Type 2(hosted) – top of an Operating System. Provalbe Security Under Virtualization

  5. PROBLEM STATEMENT • Hypervisor definitely gives various advantages but the questions remains if we are compromising on the security of the system. • The security of the system as a whole depends on how secure is the underlying hypervisor. • If we can have a model to prove that the system is as secure as being projected, it would be an advantage for the whole virtual system infrastructure. • Hence we need a provable model for the security system of the hypervisor. Provalbe Security Under Virtualization

  6. Provable Security • A system has provable security if its security requirements can be stated formally in an adversarial model. • One of thetheoretical model : Random Oracle Model. • Random oracles are a mathematical abstraction used in cryptographic proofs. • Used when no known implementable function provides the mathematical properties required by the proof. Random Oracle Model Provalbe Security Under Virtualization

  7. Hypervisor: Xen • Why Xen? • Open source • Stable and widely used • Community of followers • Supports both para and full virtualization. • Salient features • Performance isolation • Support many operating systems • Reduce performance overhead of virtualization Provalbe Security Under Virtualization

  8. Xen Architecture Provalbe Security Under Virtualization

  9. First Deliverable Installing and Configuring Hypervisor • Installing Host Operating System. • Installing Xen on host OS. • Getting the VMM running. • Installing Guest Operating Systems on Xen. Provalbe Security Under Virtualization

  10. Our Approach • Selecting appropriate operating system and installing the selected OS along with Xen. • Getting the hypervisor manager to run successfully on the kernel. • Select appropriate guest OS. • Installing the guest OS as required. Provalbe Security Under Virtualization

  11. Selection of Operating System • Does the kernel support Xen? • Does Xen manager integrate well with the selected OS? • Does it support both para & full virtualization? Provalbe Security Under Virtualization

  12. Getting things up & running • How to manage the grub loader? • How to make sure that the appropriate kernel is booted? • How to access the Xen manager? Provalbe Security Under Virtualization

  13. Guest OS • How does the guest OS selection depends on the base host OS? • What should be the ideal features of the guest OS? • How can the guest OS interact with the hardware? Provalbe Security Under Virtualization

  14. Installing Guest OS • What would be the format of input to the virtual manager(VM)? • What are the options available during the installation? Provalbe Security Under Virtualization

  15. Future Work • Studying the features and properties of hypervisor. • Study the source code. • Developing the security model. Provalbe Security Under Virtualization

  16. Thank you.Questions? Provalbe Security Under Virtualization

More Related