220 likes | 337 Vues
This lecture provides an insightful exploration of the security aspects of cloud computing, contrasting its advantages, such as elasticity, scalability, and cost-effectiveness, with the significant risks associated with third-party infrastructures. It discusses potential threats, like information leakage and denial of service attacks, particularly focusing on co-residence issues where sensitive data can be compromised by malicious users. Furthermore, case studies—such as those involving EC2 instances—highlight the implications of these vulnerabilities and the need for robust security strategies in cloud environments.
E N D
Lecture 4: Cloud Computing Security: a first look Xiaowei Yang (Duke University)
Cloud Computing: the good • Elasticity • On demand scaling • The illustration of infinite resources • Pay-as-you go • No up-front cost • Pay what you need: no risk for under or over provisioning
Cloud Computing: the bad • Placing your valuable code/data on a third party infrastructure • A rogue cloud admin • How do you verify what you get? • Your VMs may co-reside in the same physical machines/network as your adversaries’ • Information leaking • Denial of service attacks • More discuss in the next lecture
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Thomas Ristenpart, EranTromer, HovavShacham, Stefan Savage
Overview of the attack • Placement • Placing eavesdropping VMs to co-reside with targeted VMs • Extraction • Extracting confidential information via cross-VM side channels • RSA or AES secret keys
Threat model • Trusted cloud provider • A requirement for using third-party resources for now • Attackers are non-provider-affiliated malicious cloud users • Victims are other cloud users that have sensitive information
Case study: EC2 • Three availability zones for fault tolerance • Geography • Hardware isolation • Five types of instances • m1.small, c1.medium, m1.large, m1.xlarge, c1.xlarge • a total of 15 combinations
IP addresses of instances • An instance may have a public IP • 75.101.210.100 • A public IP corresponds to a DNS name • ec2-75-101-210-100.compute-1.amazonaws.com • Internal DNS queries return an internal IP and DNS names • 10.252.146.52 • domU-12-31-38-00-8D-C6.compute-1.internal
Virtualization structure • Dom0 manages guest images, physical resource provisioning, and access control rights • EC2: Dom0 routes packets for guest images • Last hop in traceroute Guest1 Guest2 Dom0 Zen Hypervisor
Network probing • External probing from outside EC2 • Internal probing from an instance inside
Cloud Cartography • Hypothesis • Same availability zone shares IP prefixes • VMs on the same physical machines share IP prefixes • Evaluation • Mapping EC2 public service to internal IPs • Creating test instances
Determining placement parameters • Launch instances for each of the 15 availability/instance type combination • Obtain their internal IP addresses
Instance type and accounts • 100 instances for the same zone • From a different account • Stick to the same
Derive IP address allocation rules • Heuristics to label /24 prefixes with both availability zone and instance type: • All IPs from a /16 are from the same availability zone. • A /24 inherits any included sampled instance type. If there are multiple instances with distinct types, then we label the /24 with each distinct type (i.e., it is ambiguous). • A /24 containing a Dom0 IP address only contains Dom0 IP addresses. We associate to this /24 the type of the Dom0’s associated instance • All /24’s between two consecutive Dom0 /24’s inherit the former’s associated type.
Achieving Co-Residence • Bruce-force • Launching many instances • Co-residence with 141 victim servers out of 1686 targeted servers • Sets of 20 • Varied time intervals • 1785 probe instances
Abusing placement locality • Timing correlation • Instance flooding • Launch many instances soon after victim servers are launched • 40% success out of 20 probes
Question • How to determine when a victim instance is launched?
Extraction • Many low level techniques • Cache usage • Load-based co-residence detection • Estimating traffic rates • Keystroke time attack
Summary • A first look at cloud security problems • Co-residence can be harmful • Next: more case studies and overview of security problems