上海交通大学:云安全(PPT讲稿)Cloud Security

Cloud Security Group V for Vendetta Wei Mao, Xiaolong Huang, Han Song 2017524
Cloud Security Group: V for Vendetta Wei Mao, Xiaolong Huang, Han Song 2017.5.24

Outline Cloud environment Security problems in cloud How to protect applications against Hypervisor/OS in cloud Intel SGX, protecting applications against OS SCONE(OSDI'16), using Intel SGX How to protect user data against applications in cloud yoan(OSDI'16), using Nacl (s&P09)and Intel SGX How to verify network security in cloud TenantGuard(NDSS'17), verifying network isolation in cloud
Outline • Cloud environment & Security problems in cloud • How to protect applications against Hypervisor/OS in cloud • Intel SGX, protecting applications against OS • SCONE (OSDI’16), using Intel SGX • How to protect user data against applications in cloud • Ryoan (OSDI’16), using NaCl (S&P’09) and Intel SGX • How to verify network security in cloud • TenantGuard (NDSS’17), verifying network isolation in cloud

Cloud Environment Terminal User Access service jug Personal health data A VM VM VM Deploy service in VM,/ through network 卜 ypervisor Amazon ec2 23andMe Manage platform through network Service Provider Cloud Operator
Cloud Environment Hypervisor VM App VM App VM App Cloud Operator Terminal User Service Provider Deploy service in VM, through network Manage platform, through network Access service, through network 23andMe Amazon EC2 Personal health data

Problems in cloud security Hypervisor protect the cloud platform by virtualization, but who protects VM, A pp, user s data Computing resources are leased from cloud platform not owned by user. Hypervisor/os has absolute privileges of vM, app, data. App tself cannot resist os's attack Hypervisor/OS may not be trustable
Problems in cloud security • Hypervisor protect the cloud platform by virtualization, but who protects VM, App, user’s data ? • Computing resources are leased from cloud platform, not owned by user. • Hypervisor/OS has absolute privileges of VM, app, data. App itself cannot resist OS’s attack • Hypervisor/OS may not be trustable

is hypervisor/OS not trustable Too big TCB(Trusted Computing Base) to be bug-free TCB: the parts that are trusted Process never trust another process, but trusts all its threads OS never trust a process, but trusts hardware Hypervisor never trust a VM, but trust hardware The tcB in cloud is very big, explained later Cloud operators themselves may be potential adversaries
Why is hypervisor/OS not trustable • Too big TCB (Trusted Computing Base) to be bug-free • TCB: the parts that are trusted • Process never trust another process, but trusts all its threads • OS never trust a process, but trusts hardware • Hypervisor never trust a VM, but trust hardware • The TCB in cloud is very big, explained later • Cloud operators themselves may be potential adversaries

Why is hypervisor/OS not trustable The TCB of hypervisor contains virtualization stack larger than 9 Million LOCs TCB Size of Xen System growing ■Xen2.0 10000 ■Xen30 Contro vn Tools ■Xen4.0 5000 Kernel VMM Xen's TcB o= VMM TCB Kernel
Why is hypervisor/OS not trustable • The TCB of hypervisor • contains virtualization stack • larger than 9 Million LOCs • growing … 0 5000 10000 VMM Dom0 Kernel Tools TCB KLOCs TCB Size of Xen System Xen 2.0 Xen 3.0 Xen 4.0 VMM Xen’s TCB Control VM Tools Kernel Guest VM

Outline Cloud environment Security problems in cloud How to protect applications against Hypervisor/OS in cloud Intel SGX, protecting applications against OS SCONE(OSDI'16), using Intel SGX How to protect user data against applications in cloud yoan(OSDI'16), using Nacl (s&P09)and Intel SGX How to verify network security in cloud TenantGuard(NDSS'17), verifying network isolation in cloud
Outline • Cloud environment & Security problems in cloud • How to protect applications against Hypervisor/OS in cloud • Intel SGX, protecting applications against OS • SCONE (OSDI’16), using Intel SGX • How to protect user data against applications in cloud • Ryoan (OSDI’16), using NaCl (S&P’09) and Intel SGX • How to verify network security in cloud • TenantGuard (NDSS’17), verifying network isolation in cloud

How to protect applications against Hypervisor/Os in cloud Dilemma: Hypervisor/os has privileges and absolute control over computing resources Solution: using hardware to fight against OS Intel Software Guard eXtensions, SGX
How to protect applications against Hypervisor/OS in cloud • Dilemma: Hypervisor/OS has privileges and absolute control over computing resources. • Solution: using hardware to fight against OS. • Intel Software Guard eXtensions, SGX

Intel SG×, key idea New processor mode: enclave untrusted trusted Execute App can create a HW enforced trusted Return environment enclave. not accessibl EENTER for OS prⅳ ileged access from App only trust Intel and SGX OS,ⅥMM,SMM forbidden Implementation
Intel SGX, key idea • New processor mode: enclave • App can create a HW enforced trusted environment, enclave, not accessible for OS • App only trust Intel and SGX implementation

Intel SGX, runtime example ① Application 1. App is built with trusted and untrusted parts Untrusted Part Trusted Part of App of App Call Gate 2. App create enclave, enclave is a memory ared protected by CPU, and OS is blind for it, privileged Process software cannot access it 2 Create Enclave 3. App call trusted part, and run in protected security environment CallTrusted0 Return (5 4. Data in enclave is plaintext, cannot be accessed from outside, and will be encrypted once move out enclave Privileged system Code 5. App finished task in enclave and return OS, VMM, BIOS, SMM App runs in common environment
Intel SGX, runtime example 1. App is built with trusted and untrusted parts 2. App create enclave, enclave is a memory area protected by CPU, and OS is blind for it, privileged software cannot access it. 3. App call trusted part, and run in protected security environment 4. Data in enclave is plaintext, cannot be accessed from outside, and will be encrypted once move out enclave 5. App finished task in enclave and return 6. App runs in common environment
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 局域网的硬件设备和操作系统(PPT讲稿).ppt
- 大数据分析(PPT讲稿)大数据引领我们走向数据智能化时代.ppt
- 淮阴工学院:《数据库原理》课程教学资源(PPT课件讲稿)第3章 关系数据库的基本理论.ppt
- 《Java面向对象程序设计》课程教学资源(PPT课件讲稿)第三章 Java面向对象编程.pptx
- 《Java面向对象程序设计》课程教学资源(PPT课件讲稿)第六章 Java输入输出流与文件操作.pptx
- 《Java面向对象程序设计》课程教学课件(PPT讲稿)流程控制语句.pptx
- 《Java面向对象程序设计》课程教学课件(PPT讲稿)AWT和Swing组件.pptx
- 江苏海洋大学(淮海工学院):《Java面向对象程序设计》课程教学资源(PPT课件讲稿)第4章 Java图形用户界面设计.pptx
- 江苏海洋大学(淮海工学院):《Java面向对象程序设计》课程教学资源(PPT课件讲稿)第2章 Java语言基础.pptx
- 《Java面向对象程序设计》课程教学资源(PPT课件讲稿)第四章 Java图形用户界面设计 4.2 AWT和Swing组件.pptx
- 《高级语言程序设计 Advanced Programming》课程教学资源(PPT课件讲稿)第8章 指针.ppt
- 《C语言程序设计》课程教学资源(PPT课件讲稿)第5章 循环结构程序设计.ppt
- 广西外国语学院:《计算机网络》课程教学资源(PPT课件讲稿)第8章 DNS.ppt
- 深圳大学:《图片处理基础》课程教学课件(PPT讲稿)Poisson Image Editing.pptx
- 《PhotoshopCS2基础教程与上机指导》课程教学资源(PPT课件讲稿)第20章 Web图像与动画设计.ppt
- 广西医科大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Chapter 17 NETWORK MANAGEMENT.pptx
- 局域网基础知识及网络设备(PPT课件讲稿).ppt
- 长沙医学院:《计算机专业英语》课程教学资源_教学大纲.doc
- 郑州大学:《计算机组成原理》课程教学资源(PPT课件讲稿,共八章,任课教师:石磊).ppt
- 《数字图像处理》课程教学资源(PPT课件讲稿)第4章 图像增强.ppt
- 上海交通大学:《Multicore Architecture and Parallel Computing》课程教学资源(PPT课件讲稿)Lecture 7 CUDA.ppt
- 上海交通大学:《通信网络》课程PPT教学课件(讲稿)Communication Networks - ANALYSIS OF 10G EEE PROTOCOL.pptx
- 亚马逊云计算AWS(Amazon Web Service)、Cloud Computing——Cassandra.ppt
- 《计算机图形学》课程教学资源(PPT课件讲稿)Chapter 4 Graphics Output Primitives(Part II).pptx
- 北京理工大学:《软件工程基础》课程教学资源(PPT课件讲稿)需求工程(主讲:刘驰).ppt
- 上海交通大学:Scheduling Algorithms in Heterogeneous Computing Systems.pptx
- 上海交通大学:《程序设计》课程教学资源(PPT课件讲稿)第5章 批量数据处理——数组.ppt
- 上海交通大学:《现代操作系统》课程教学资源(PPT课件讲稿)Chapter 02 进程与线程 Process and Thread.pps
- 《数据库基础与应用》课程PPT教学课件(Access案例教程)第9章 数据库语言SQL.pptx
- 《数据库基础与应用》课程PPT教学课件(Access案例教程)第8章 宏.pptx
- 《数据库基础与Access应用》课程教学资源(PPT课件)第12章 应用实例.pptx
- 《数字图像处理基础》课程教学资源(教学大纲.pdf
- 长安大学:《微机原理》课程教学资源(PPT课件讲稿)第7章 汇编语言程序设计.pptx
- 西安交通大学:《微型计算机接口技术》课程教学资源(PPT课件讲稿)第二章 微型处理器与单片机.ppt
- 中国铁道出版社:《局域网技术与组网工程》课程教学资源(PPT课件讲稿)第7章 网络系统集成与网络维护.ppt
- 《计算机应用基础》课程教学资源(PPT课件讲稿)第3章 Word 2007文字处理.ppt
- 《微机原理》课程教学资源(PPT课件)第六章 微型计算机的输入/输出.ppt
- 《单片机原理及应用》课程教学资源(PPT课件)第8章 AT89S51单片机外部存储器的扩展.ppt
- 《网页设计与制作》课程教学资源(PPT课件讲稿)第七章 模板与库的应用.ppt
- 《网页设计与制作》课程教学资源(PPT课件讲稿)第四章 设计页面布局.ppt