Towards Supercloud Computing: User-Centric Security Management for Clouds of Clouds Marc Lacoste Orange Labs SEC2 ComPAS’15 Workshop on Cloud Security Lille, June 30, 2015
Cloud Security Today Security = key concern in cloud adoption for the enterprise market Threats are on the rise Source: Cloud Security Alliance, 2013. Attacks are costly Source: Ponemon, 2013. Awareness is growing, but is not enough
The Cloud everywhere, increasingly complex …
…and so are security breaches! Classical cloud threats… Secure, Robust SDN NFV Security … Root causes: commodity hardware, Challenges: central PoF, trust and cloud isolation technology Mitigation: Issues: Replication, diversity, authentication Topology validation new threats Policy consistency, secure SDN toolkits Availability of management network Intrusion prevention? Secure boot ... Fault tolerance? I/O partitioning Performance isolation
Hasn’t someone been forgotten? The User? The Customer? Are they going to use those infrastructures? Are they going to pay for them?
Provider-centric clouds prevent interoperability and unified control The Cloud as utility Multi-provider clouds Promise: high availability & security , NOT ACHIEVED energy efficiency, scalability , … Feature-rich services: intrusion NOT DEPLOYED monitoring, elastic load balancing, … INTEROPERABILITY S Vendor lock-in E Different SLAs C Provider-centric U cloud UNIFIED CONTROL R deficiencies Heterogeneous I infrastructure services T Monolithic infrastructure Technological choices Y
Outline Moving to User-Centric Cloud Security Secure Supercloud Computing 11 Key Enabling Technologies The H2020 SUPERCLOUD Project Next Steps
User-centric clouds require a resource distribution layer
Customer Security Expectations
Taking Into Account Security Challenges Infrastructure security: strong, flexible, automated security for compute resources Vulnerabilities in complex infrastructure, mitigation of cross-layer attacks Lack of flexibility and control in security management Automation of security management: in layers, between providers Data management: on-demand, unified experience in protection of data assets Management of access rights, continuum between provider vs. user control Blind compute over data stored in multi-clouds Traceability of information for accountability and privacy Network management: resilient, secure virtual networking Resilient resource provisioning across heterogeneous clouds End-to-end inter-cloud network security with different security SLAs
Outline Moving to User-Centric Cloud Security Secure Supercloud Computing 11 Key Enabling Technologies The H2020 SUPERCLOUD Project Next Steps
Secure Supercloud Computing The Supercloud NORTH INTERFACE provides user-centric self-service security & dependability The Supercloud SOUTH INTERFACE provides provider-centric self-managed security & dependability
Supercloud Computing: Self-Service Security Self-service security relies on: Abstraction & Policies Control Layer a distributed, flexible resource & control layer spanning compute, data, network multi-provider security policies
Supercloud Computing: Self-Managed Security Security and Trust Self-managed security relies on: management bi-dimensional (cross-layer, multi-provider) self-protection for compute and network resources bi-dimensional trust management
Supercloud Computing: End-to-End Security E2E network E2E VM SLAs security End-to-end security relies on: E2E security SLAs for VMs & data protection E2E network security in control and data planes E2E data E2E network security security
Supercloud Computing: Resilience Resilience Resilience relies on: multi-cloud data availability resilient networking in data and control plane Resilience Resilience
Outline Moving to User-Centric Cloud Security Secure Supercloud Computing 11 Key Enabling Technologies The H2020 SUPERCLOUD Project Next Steps
Key Enabling Technologies: Self-Service Security Flexible hypervisor security architectures: User data isolation + protection against the cloud provider Modular, secure interface for the hypervisor Blind computation: Lightweight homomorphic operations over encrypted data Advanced cryptographic tools for data security Security SLA management: Security SLA (SSLA) language bridging the gap between layers SSLA templates and combination functions for easy specification
Key Enabling Technologies: Self-Managed Security Autonomic IaaS security supervision: Cross-layer security monitoring, even if some layers are compromised Cross-provider security monitoring, seamless integration Security policies: Flexible security policy languages and deployment tools Policy negotiation tools for conflict resolution Network security management: Finer-grained network control than current specifications SDN components/APIs for advanced policy monitoring
Key Enabling Technologies: End-to-End Security Cryptographic protection: Integrity and consistency verification Processing cryptographically protected data Storage access control: Transparent cryptographic protection mechanisms Flexible cloud-based key management Trust management: Horizontal trust management between different cloud entities Vertical trust management across cloud system configurations Abstraction of trust through specification language
Key Enabling Technologies: Resilience SDN Resilience: Secure, dependable SDN controller for multi-cloud networking Intra/inter-cloud infrastructure resilient to network failures Data availability: Integration of disruptive secrecy technology to multi-cloud storage replication New services based on multi-cloud storage algorithms Adaptive multi-cloud algorithms with outstanding performance for real workloads
What is VESPA? = Virtual Environments Self-Protecting Architecture An automated security supervision framework for IaaS and multi-DC infrastructures Design principles STRONG SECURITY Cross-layer security: detect / respond to overall extent of attack. Open architecture: mitigate new threats, integrate legacy counter-measures. SIMPLE E SECURITY Automated security supervision: choose in-layer, cross-layer, multi-DC. Tuneable defense patterns: orchestrate multiple loops for rich defense strategy. CLOUD PROVIDER CUSTOMERS Anti-malware. APPLICATION ONS Anti-DDoS. IaaS monitoring SecaaS End-to-end security. appliances
VESPA System Architecture Resource Security Agent Orchestration Plane Plane Plane Plane DETECTION HO Detection Manager VM Detection Agent DECISION Hypervisor REACTION VO Reaction Manager Reaction Agent Physical HO RESOURCES
VESPA System Architecture Resource Security Agent Orchestration Plane Plane Plane Plane Intra-Layer Self-Protection DETECTION HO Detection Manager VM Detection Agent DECISION Hypervisor REACTION VO Reaction Manager Reaction Agent Physical HO RESOURCES
VESPA System Architecture Resource Security Agent Orchestration Plane Plane Plane Plane Cross-Layer DETECTION Self-Protection HO Detection Manager VM Detection Agent DECISION Hypervisor REACTION VO Reaction Manager Reaction Agent Physical HO RESOURCES
The VESPA Project RESULTS LTS CURRENT T VESPA FUNCTI TION ONALITI ALITIES So far VESPA = core + security plug-ins. Framework: supervision of single Supporte ted In progres ess cloud and multi-DC security. Anti-virus Integration with Heat + Horizon Available in open source . Hypervisor control Network zones Different applications demonstrating Firewall vSwitch management (SDN) viability of self-defending cloud concept. Log analysis Research results : Framework [ICAC’12 ] . . Extensions: Network management (SDN approach). Mobile cloud SLAs: Orange MC2 [UCC’13]. VMM self-protection: KungFuVisor [EURODW’12], self -stabilization [DSS’14]. Keynotes [SSS’11], panels [IM’11, NOMS’14], tutorials [ICAR’13, MOBILECLOUD’14]. Code available at : https://github.com/Orange-OpenSource/vespa-core
Outline Moving to User-Centric Cloud Security Secure Supercloud Computing 11 Key Enabling Technologies The H2020 SUPERCLOUD Project Next Steps
The SUPERCLOUD Project 28
The SUPERCLOUD Project: Goals and Expected Results Goal: a security management infrastructure for secure supercloud computing Expected Results: A security management infrastructure: 360 ° autonomic security supervision , horizontally and vertically for superclouds A user-centric to provider-centric continuum of security services End-to-end trust management A data management framework: Advanced cryptographic tools (e.g., access control, secure computation) A resilience framework for multi-cloud storage infrastructures A multi-cloud network management infrastructure: Resilient virtual network provisioning across multiple clouds Sanitized network environment with tunable security guarantees
Recommend
More recommend