Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2670979.2670989acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
tutorial

On the Control Plane of a Self-service Cloud Platform

Published: 03 November 2014 Publication History
  • Get Citation Alerts
  • Abstract

    Self-service Cloud Computing (SSC) [7] is a recently-proposed model to improve the security and privacy of client data on public cloud platforms. It prevents cloud operators from snooping on or modifying client VMs and provides clients the flexibility to deploy security services, such as VM introspection tools, on their own VMs. SSC achieves these goals by modifying the hypervisor privilege model.
    This paper focuses on the unique challenges involved in building a control plane for an SSC-based cloud platform. The control plane is the layer that facilitates interaction between hosts in the cloud infrastructure as well as between the client and the cloud. We describe a number of novel features in SSC's control plane, such as its ability to allow specification of VM dependencies, flexible deployment of network middleboxes, and new VM migration protocols. We report on our design and implementation of SSC's control plane, and present experimental evaluation of services implemented atop the control plane.

    References

    [1]
    vmitools -- Virtual machine introspection tools. http://code.google.com/p/vmitools/.
    [2]
    Intel Software Guard Extensions Programming Reference. http://software.intel.com/sites/default/files/329298-001.pdf, September 2013. Publication number 329298-001US.
    [3]
    M. Ben-Yahuda, M. D. Day, Z. Dubitsky, M. Factor, N. Har'El, A. Gordon, A. Liguori, O. Wasserman, and B. Yassour. The Turtles project: Design and implementation of nested virtualization. In Operating Systems Design and Implementation (OSDI), 2010.
    [4]
    T. Benson, A. Akella, A. Shaikh, and S. Sahu. CloudNaaS: A cloud networking platform for enterprise applications. In ACM Symposium on Cloud Computing (SoCC), 2011.
    [5]
    S. Berger, R. Caceres, K. Goldman, R. Perez, R. Sailer, and L. van Door. vTPM: Virtualizing the Trusted Platform Module. In USENIX Security Symposium, 2006.
    [6]
    S. Butt. {Xen-devel} Bidirectional network throughput for netback, July 2013. http://lists.xen.org/archives/html/xen-devel/2013-07/msg02709.html.
    [7]
    S. Butt, A. Lagar-Cavilla, A. Srivastava, and V. Ganapathy. Self-service cloud computing. In ACM Conference on Computer and Communications Security (CCS), 2012.
    [8]
    C. Chen, P. Maniatis, A. Perrig, A. Vasudevan, and V.Sekar. Verifiable resource accounting for outsourced computation. In ACM International Conference on Virtual Execution Environments (VEE), 2013.
    [9]
    P. Colp, M. Nanavati, J. Zhu, W. Aiello, G. Coker, T. Deegan, P. Loscocco, and A. Warfield. Breaking Up is Hard to Do: Security and Functionality in a Commodity Hypervisor. In ACM Symposium on Operating Systems Principles, 2011.
    [10]
    B. Cully, G. Lefebvre, D. Meyer, M. Feeley, N. Hutchinson, and A. Warfield. Remus: High availability via asynchronous virtual machine replication. In Networked Systems Design and Implementation (NSDI), 2008.
    [11]
    CVE-2007-4993. Xen guest root escapes to dom0 via pygrub.
    [12]
    CVE-2007-5497. Integer overflows in libext2fs in e2fsprogs.
    [13]
    CVE-2008-0923. Directory traversal vulnerability in the shared folders feature for VMWare.
    [14]
    CVE-2008-1943. Buffer overflow in the backend of XenSource Xen paravirtualized frame buffer.
    [15]
    CVE-2008-2100. VMWare buffer overflows in VIX API let local users execute arbitrary code in host OS.
    [16]
    Gartner. Assesing the Security Risks of Cloud Computing. http://www.gartner.com/DisplayDocument?id=685308.
    [17]
    iperf3. http://code.google.com/p/iperf/.
    [18]
    J. W. Jiang, T. Lan, S. Ha, M. Chen, and M. Chiang. Joint VM placement and routing for data center traffic engineering. In IEEE INFOCOM, 2012.
    [19]
    K. Kortchinsky. Hacking 3D (and breaking out of VMWare). In BlackHat USA, 2009.
    [20]
    B. Kauer, P. Verissimo, and A. Bessani. Recursive virtual machines for advanced security mechanisms. In 1st International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments, 2011.
    [21]
    E. Keller, J. Szefer, J. Rexford, and R. Lee. Eliminating the hypervisor for a more secure cloud. In ACM Conference on Computer and Communications Security (CCS), 2011.
    [22]
    X. Li, J. Wi, S. Tang, and S. Lu. Let's stay together: Towards traffic-aware virtual machine placement in data centers. In IEEE INFOCOM, 2014.
    [23]
    J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB reduction and attestation. In IEEE Symposium on Security and Privacy, 2010.
    [24]
    D. Murray, G. Milos, and S. Hand. Improving Xen Security Through Disaggregation. In ACM International Conference on Virtual Execution Environments (VEE), 2008.
    [25]
    B. Payne, M. Carbone, and W. Lee. Secure and Flexible Monitoring of Virtual Machines. In Annual Computer Security Applications Conference (ACSAC), 2007.
    [26]
    B. Pfaff, J. Pettit, K. Amidon, M. Casado, T. Koponen, and S. Shenker. Extending networking into the virtualization layer. In HotNets, 2009.
    [27]
    Z. Qazi, C. Tu, L. Chiang, R. Miao, V. Sekar, and M. Yu. SIMPLE-fying middlebox policy enforcement using SDN. In ACM SIGCOMM Conference, 2013.
    [28]
    T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In ACM Conference on Computer and Communications Security (CCS), 2009.
    [29]
    R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In USENIX Security Symposium, 2004.
    [30]
    N. Santos, R. Rodrigues, K. Gummadi, and S. Saroiu. Policy-sealed data: A new abstraction for building trusted cloud services. In USENIX Security Symposium, 2012.
    [31]
    A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes. In ACM Symposium on Operating Systems Principles (SOSP), 2007.
    [32]
    V. Shrivastava, P. Zerfos, K-W. Lee, H. Jamjoom, Y-H. Liu, and S. Banerjee. Application-aware virtual machine migration in data centers. In IEEE INFOCOM, 2011.
    [33]
    A. Srivastava and J. Giffin. Tamper-resistant, app-aware blocking of malicious network connections. In Symposium on Research in Attacks, Intrusions and Defenses, 2008.
    [34]
    U. Steinberg and B. Kauer. NOVA: A Microhypervisor-Based Secure Virtualization Architecture. In ACM European Conference on Computer Systems (EuroSys), 2010.
    [35]
    TCPDump and libpcap. http://www.tcpdump.org.
    [36]
    V. Varadarajan, T. Kooburat, B. Farley, T. Ristenpart, and M. Swift. Resource-freeing attacks: Improve your cloud performance (at your neighbor's expense). In ACM Conference on Computer and Communications Security (CCS), 2012.
    [37]
    D. Williams, H. Jamjoom, and H. Weatherspoon. The Xen-Blanket: Virtualize Once, Run Everywhere. In European Conference on Computer Systems (EuroSys), 2012.
    [38]
    F. Zhang, J. Chen, H. Chen, and B. Zang. CloudVisor: Retrofitting Protection of Virtual Machines in Multi-tenant Cloud with Nested Virtualization. In ACM Symposium on Operating Systems Principles (SOSP), 2011.

    Cited By

    View all

    Index Terms

    1. On the Control Plane of a Self-service Cloud Platform

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SOCC '14: Proceedings of the ACM Symposium on Cloud Computing
      November 2014
      383 pages
      ISBN:9781450332521
      DOI:10.1145/2670979
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 03 November 2014

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. cloud computing
      2. privacy
      3. security
      4. trust

      Qualifiers

      • Tutorial
      • Research
      • Refereed limited

      Funding Sources

      Conference

      SOCC '14
      Sponsor:
      SOCC '14: ACM Symposium on Cloud Computing
      November 3 - 5, 2014
      WA, Seattle, USA

      Acceptance Rates

      Overall Acceptance Rate 169 of 722 submissions, 23%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)7
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 27 Jul 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2020)Secure VM management with strong user binding in semi-trusted cloudsJournal of Cloud Computing10.1186/s13677-020-0152-99:1Online publication date: 17-Jan-2020
      • (2019)Trusted Cloud Computing Architectures for infrastructure as a serviceComputers and Security10.1016/j.cose.2018.12.01482:C(196-226)Online publication date: 1-May-2019
      • (2019)Recent trends in applying TPM to cloud computingSECURITY AND PRIVACY10.1002/spy2.933:1Online publication date: 28-Nov-2019
      • (2018)UVBond: Strong User Binding to VMs for Secure Remote Management in Semi-Trusted Clouds2018 IEEE/ACM 11th International Conference on Utility and Cloud Computing (UCC)10.1109/UCC.2018.00030(213-222)Online publication date: Dec-2018
      • (2016)Empirical Evidences in Software-Defined Network Security: A Systematic Literature ReviewInformation Fusion for Cyber-Security Analytics10.1007/978-3-319-44257-0_11(253-295)Online publication date: 22-Oct-2016
      • (2015)A Classifier for the Latency-CPU Behaviors of Serving Jobs in Distributed EnvironmentsProceedings of the 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)10.1109/CloudCom.2015.78(123-130)Online publication date: 30-Nov-2015
      • (2015)Reflections on the Self-service Cloud Computing ProjectProceedings of the 11th International Conference on Information Systems Security - Volume 947810.1007/978-3-319-26961-0_4(36-57)Online publication date: 16-Dec-2015

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media