WWW.DISSERTATION.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Dissertations, online materials
 
<< HOME
CONTACTS



Pages:   || 2 | 3 | 4 | 5 |

«Abstract. A filesystem-level storage cloud offers network-filesystem access to multiple customers at low cost over the Internet. In this paper, we ...»

-- [ Page 1 ] --

A Comparison of Secure Multi-tenancy Architectures

for Filesystem Storage Clouds

Anil Kurmus1, Moitrayee Gupta 2, Roman Pletka1, Christian Cachin1, and Robert

Haas1

1

IBM Research - Zurich

{kur,rap,cca,rha}@zurich.ibm.com

2

Department of Computer Science and Engineering, UCSD

m5gupta@cs.ucsd.edu

Abstract. A filesystem-level storage cloud offers network-filesystem access to

multiple customers at low cost over the Internet. In this paper, we investigate

two alternative architectures for achieving multi-tenancy securely and efficiently in such storage cloud services. They isolate customers in virtual machines at the hypervisor level and through mandatory access-control checks in one shared operating-system kernel, respectively. We compare and discuss the practical secu- rity guarantees of these architectures. We have implemented both approaches and compare them using performance measurements we obtained.

1 Introduction Storage cloud services allow the sharing of storage infrastructure among multiple cus- tomers and hence significantly reduce costs. Typically, such services provide object or filesystem access over a network to the shared distributed infrastructure. To support multiple customers or tenants concurrently, the network-filesystem-access services must be properly isolated with minimal performance impact.

We consider here a filesystem storage cloud as a public cloud storage service used by customers to mount their own filesystems remotely through well-established network filesystem protocols such as NFS and the Common Internet Filesystem (CIFS, also known as SMB). Such a service constitutes a highly scalable, performant, and reliable enterprise network-attached storage (NAS) accessible over the Internet that provides services to multiple tenants.

In general, a cloud service can be run at any of the following increasing levels of

multi-tenancy:

– Hardware level: server hardware, OS, and application dedicated per client.

– Hypervisor level: share server hardware, and use virtualization to host dedicated OS and application per client.

– OS level: share server hardware and OS, and run a dedicated application per client.

– Application level: share server hardware, OS, and application server among clients.

Work done at IBM Research - Zurich.

2 Anil Kurmus, Moitrayee Gupta, Roman Pletka, Christian Cachin, and Robert Haas Intuitively, the higher the level of multi-tenancy, the easier it seems to achieve a resource- efficient design and implementation; at the same time, though, it gets harder (conceptually and in terms of development effort) to securely isolate the clients from each other.

In this paper, we investigate a hypervisor-level and an OS-level multi-tenant filesystem storage cloud architecture, and compare them in terms of performance and security.

The hypervisor-level multi-tenancy approach is based on hardware virtualization (with para-virtualized drivers for improved networking performance). We refer to this architecture as the virtualization-based multi-tenancy (VMT) architecture. The OS-level multi-tenancy approach uses mandatory access control (MAC) in the Linux kernel and is capable of isolating customer-dedicated user-space services on the same OS. Such an architecture may also leverage, for instance, OS-level virtualization technologies such as OpenVZ or Linux Containers (LXC). We refer to this architecture as the operatingsystem-based multi-tenancy (OSMT) architecture in the remainder of this paper.

We have implemented both approaches on real hardware in the IBM Scale-out NAS (SONAS) [1] and the IBM General Parallel Filesystem (GPFS) [2] technologies. We used open-source components such as KVM [3] with virtio networking for virtualization and SELinux (http://selinuxproject.org/) for MAC.

Section 3 describes the architecture of a filesystem storage cloud and introduces the two designs. Section 4 defines an adversary model and discusses the security of both architectures according to this model. Section 5 presents the implementation and benchmark results. Related work is discussed in Section 6.

2 Background One can distinguish the following categories of general-purpose storage clouds (ignoring

storage clouds that provide database-like structures on content):

– Block storage clouds, with a block-level interface, i.e., an interface that allows the writing and reading of fixed-sized blocks. Examples of such clouds include Amazon EBS.

– Object storage clouds, composed of buckets (or containers) that contain objects (or blobs). These objects are referred to by a key (or name). The API is usually very simple: typically a REST API with create and remove operations on buckets and put, get, delete, and list operations on objects. Example of such storage clouds include Amazon S3, Rackspace Cloudfiles, and Azure Storage Blobs.

– Filesystem storage clouds, with a full-fledged filesystem interface, therefore referred to also as “cloud NAS.” Examples of such clouds include Nirvanix CloudNAS, Azure Drive, and IBM Scale-Out Network Attached Storage (SONAS).

Application-level multi-tenancy is sometimes also referred to as native multi-tenancy.

Some authors consider it the cleanest way to isolate multiple tenants [4]. However, achieving multi-tenancy securely is very challenging and therefore not common for filesystem storage clouds. The reasons lie in the complex nature of this task: unlike other types of storage clouds, filesystem storage clouds possess complex APIs that have evolved over time, which leads to large attack surfaces. The vulnerability track record of these applications seems to confirm this intuition. CIFS servers were vulnerable A Comparison of Secure Multi-tenancy Architectures for Filesystem Storage Clouds 3 to various buffer-overflows (e.g., CVE-2010-3069, CVE-2010-2063, CVE-2007-2446, CVE-2003-0085, CVE-2002-1318, see http://cve.mitre.org/), format string vulnerability leading to arbitrary code execution (CVE-2009-1886), directory traversals (CVE-2010-0926, CVE-2001-1162), while NFS servers were also vulnerable to similar classic vulnerabilities as well as more specific ones such as filehandle vulnerabilities [5].





Moreover, adding multi-tenancy support into these server applications would require significant development (e.g., in order to distinguish between different authentication servers for specific filesystem exports) which will most likely result in new vulnerabilities.

We discuss in Sections 3 and 4 architectures with lower levels of multi-tenancy. They effectively restrict the impact of arbitrary code execution vulnerabilities to the realm of a single tenant: by definition, this cannot be achieved with application-level multi-tenancy.

This paper targets the IBM SONAS [1] platform, which evolved from the IBM ScaleOut File Services (SoFS) [6]. IBM SONAS provides a highly scalable network-attached storage service, and therefore serves as a typical example of a filesystem storage cloud.

IBM SONAS currently contains support for hardware-level multi-tenancy according to the architectures discussed in this work. Adding a higher-level of multi-tenancy is an important step to reduce the cost of a cloud-service provider.

3 System Description

Section 3.1 gives an overview of the general architecture of a filesystem storage cloud.

Section 3.2 describes the MAC policies which are used in both architectures.

Sections 3.3 and 3.4 introduce the two alternatives, detailing the internals of the interface nodes, the key element of the filesystem storage cloud architecture.

3.1 General Description Figure 1 depicts the general architecture of a filesystem storage cloud that consists of the

following elements:

–  –  –

Fig. 1. General architecture of a filesystem storage cloud.

4 Anil Kurmus, Moitrayee Gupta, Roman Pletka, Christian Cachin, and Robert Haas – Customers and users: A customer is an entity (e.g., a company) that uses at least one network file system. A customer can have multiple individual users. We assume that multiple customers connect to the filesystem storage cloud and that each customer has a separate set of users. Data is separated between users from distinct customers, and user IDs are in a separate namespace for each customer. Hence two distinct customers may allocate the same user ID without any conflict on the interface nodes or in the storage back-end.

– Interface nodes and cluster: An interface node is a system running filer services such as NFS or CIFS daemons. Interface nodes administratively and physically belong to the cloud service provider and serve multiple customers. A customer connects to the filesystem storage cloud through the interface nodes and mounts its filesystems over the Internet. Multiple interface nodes together form an interface cluster, and one interface node may serve multiple customers. A customer connects only to nodes in one interface cluster.

– Shared back-end storage: The shared back-end storage provides block-level storage for user data. It is accessible from the interface clusters over a network using a distributed filesystem such as GPFS [2]. It is designed to be reliable, highly available, and performant. We assume that no security mechanism exists within the distributed filesystem to authenticate and authorize nodes of the cluster internally.

– Customer boarding, unboarding, and configuration: Typically, interface nodes must be created, configured, started, stopped, or removed when customers are boarded (added to the service) or unboarded (removed from the service). This is performed by administration nodes not shown here, which register customer accounts and configure filesystems. Ideally, boarding and unboarding should consume a minimal amount of system resources and time.

As an example, a customer registers a filesystem with a given size from the filesystem storage cloud provider, and then configures machines on the customer site that mount this filesystem. The users of the customer can then use the cloud filesystem similar to how they use a local filesystem. Customers connect to the interface cluster via a dedicated physical wide-area network link or via a dedicated VPN over the Internet, ideally with low latency. The cloud provider may limit the maximal bandwidth on a customer link.

To ensure high availability and high throughput, a customer accesses the storage cloud through the clustered interface nodes. Interface nodes have to perform synchronization tasks within their cluster and with the back-end storage, generating additional traffic. An interface node has three network interfaces: one to the customer, one to other nodes in the cluster, and one to the back-end storage.

Dimensioning. The size of a filesystem storage cloud is determined by the following parameters, which are derived from service-level agreements and from the (expected or observed) load in the system: the number of customers c assigned to an interface cluster, the number of interface nodes n in a cluster (due to synchronization overhead, this incurs a trade-off between higher availability and better performance), and the number of clusters m attached to the same storage back-end.

Customer and user authentication. Describing customer authentication would exceed the scope of this work; in practice, it can be delegated to the customer’s VPN endpoint in the A Comparison of Secure Multi-tenancy Architectures for Filesystem Storage Clouds 5 premises of the service-cloud provider. The authentication of users from a given customer also requires that customers provide a directory service that will serve authentication requests made by users. Such a directory service can be physically located on the customer’s premises and under its administration or as separate service in the cloud. In either case, users authenticate to an interface node, which in turn relays such requests to the authentication service of the customer.

3.2 Mandatory Access Control Policies We use mandatory access control on the filer services. In case of their compromise, MAC provides a first layer of defense on both architectures. For practical reasons, we have used SELinux. Other popular choices include grsecurity RBAC [7] or TOMOYO. These MAC systems limit the privileges of the filer services to those required, effectively creating a sandbox environment, by enforcing policies that are essentially a list of permitted operations (e.g., open certain files, bind certain ports, fork,... ).

As an example, the policies on the interface nodes basically permit the filer services to perform the following operations: bind on their listening port and accept connections, perform all filesystem operations on the customer’s data directory (which resides on a distributed filesystem), append to the filer log files, and read the relevant service configuration files.

The protection provided by these policies can be defeated in two ways. One possibility is if the attacker manages to execute arbitrary code in kernel context (e.g., through a local kernel exploit), in which case it is trivial to disable any protections provided by the kernel, including MAC. The second possibility is by exploiting a hole in the SELinux policy, which would be the case, for example, if a filer service were authorized to load a kernel module.

An important example of the benefit of these policies is the restriction of accessible network interfaces to the customer and intra-cluster network interfaces only. Another example is the impossibility for processes running in the security context of the filer services to write to files they can execute, or to use mmap() and mprotect() to get around this restriction. In practice, this means, for example, that an attacker making use of a remote exploit on a filer service cannot just obtain a shell and download and execute a local kernel exploit: the attacker would have to find a way to execute the latter exploit directly within the first exploit, which, depending on the specifics of the vulnerabilities and memory protection features, can be impossible.



Pages:   || 2 | 3 | 4 | 5 |


Similar works:

«Aegon Group Primary Credit Analyst: Mark Button, London (44) 20-7176-7045; mark.button@standardandpoors.com Secondary Contact: Patrick C Wong, New York (1) 212-438-1936; patrick.wong@standardandpoors.com Table Of Contents Rationale Outlook Base-Case Scenario Company Description Business Risk Profile Financial Risk Profile Other Assessments Factors Specific To The Holding Company Related Criteria And Research WWW.STANDARDANDPOORS.COM/RATINGSDIRECT MARCH 5, 2015 1 1387618 | 300000817 Aegon Group...»

«IRLE IRLE WORKING PAPER #45-92 June 1992 Becoming a High-Performance Work Organization: The Role Of Security, Employee Involvement, and Training Clair Brown, Michael Reich, and David Stern Cite as: Clair Brown, Michael Reich, and David Stern. (1992). “Becoming a High-Performance Work Organization: The Role Of Security, Employee Involvement, and Training.” IRLE Working Paper No. 45-92. http://irle.berkeley.edu/workingpapers/45-92.pdf irle.berkeley.edu/workingpapers Institute for Research on...»

«FJM 152 Julia Baker FIJI MARINE CONSERVATION & DIVING Beqa Island, Fiji FJM Phase 152 Science Report April 2015 – June 2015 Author; Julia Baker MSc BSc (Hons) (Principal Investigator) 1 FJM 152 Julia Baker Field Staff Staff member Role Brittany Walters(BW) Project Manager Julia Baker(JB) Principal Investigator Alice Clemet(AC) Dive Officer Kathryn Ayres(KA) Assistant Research Officer Emily Hooper(EH) Assistant Research Officer 2 FJM 152 Julia Baker Table of Contents 1. Introduction 1.1...»

«The 4th International Conference of the International Forum on Urbanism (IFoU) 2009 Amsterdam/Delft The New Urban Question – Urbanism beyond Neo-Liberalism MINIMUM IMPACT HOUSE THE PROTOTYPE FOR SUSTAINABLE BUILDING IN THE CITY CENTRE AND WHAT’S BEYOND THE PROTOTYPE Hans Drexler & Marc Guinand & Daniel Jauslin Drexler Guinand Jauslin Architects, Frankfurt, Rotterdam, Zurich, dgj@dgj.eu TU Darmstadt, Entwerfen und Enetgieeffizientes Bauen, Germany, drexler@ee.tu-darmstadt.de ETH Zürich,...»

«JOURNAL OF EDUCATIONAL AND INSTRUCTIONAL STUDIES IN THE WORLD May 2012 Volume 2 Issue 2 ISSN: 2146-7463 http://www.wjeis.org JOURNAL OF EDUCATIONAL AND INSTRUCTIONAL STUDIES IN THE WORLD May 2012, Volume: 2 Issue: 2 ISSN: 2146-7463 Contact Addresses Prof. Dr. Zeki Kaya, Gazi Üniversitesi, Endüstriyel Sanatlar Eğitim Fakültesi, Eğitim Bilimleri Bölüm Başkanlığı, 06830 Gölbaşı Ankara/Türkiye E. Mail: wjeis1@gmail.com Fax: +903124853123 Prof. Dr. Uğur Demiray, Anadolu...»

«AO 91 (Rev. 11/11) Criminal Complaint AUSA Stephen Chahn Lee (312) 353-4127 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION UNITED STATES OF AMERICA CASE NUMBER: v. UNDER SEAL DIANA JOCELYN GUMILA CRIMINAL COMPLAINT I, the complainant in this case, state that the following is true to the best of my knowledge and belief. Beginning no later than 2011 and continuing until the present, at Schaumburg, in the Northern District of Illinois, Eastern Division, and...»

«45 Section of Dermatology 871 Small doses of X-rays stopped the irritation for a few weeks. The patient has been having thyroid and radiostoleum and is now having liver extract. The condition appears to be spreading. Pemphigus Foliaceus.-A. M. H. GRAY, C.B.E., M.D. Phillis P., aged 17, has a generalized eruption which began when she was aged 131 years with some small blisters on the front of the chest. These blisters burst and left a red, scaly patch which spread over the front of the chest on...»

«Article JUST ONE OF THE GUYS? How Transmen Make Gender Visible at Work KRISTEN SCHILT University of California, Los Angeles This article examines the reproduction of gendered workplace inequalities through in-depth interviews with female-to-male transsexuals (FTMs). Many FTMs enter the workforce as women and then transition to become men, an experience that can provide them with an “outsider-within” perspective on the “patriarchal dividend”—the advantages men in general gain from the...»

«Alne Primary School Guide for Progression in Grammar 2014 Reception: I can: Use Simple sentences Use Simple Connectives:egand,who,until,but Say a sentence, write and read it back to check it makes sense. Use compound sentences using connectives (coordinating conjunctions) and / but -„ly‟ openers Luckily / Unfortunately, ‘Run’ Repetition for rhythm: e.g. He walked and he walked Use Repetition in description e.g.a lean cat, a mean cat Use Determiners...»

«Deirdre A. Pfeiffer, Ph.D., AICP School of Geographical Sciences and Urban Planning Arizona State University Coor Hall, 975 S. Myrtle Ave, P.O. Box 875302 Tempe, AZ 85287-5302 (323) 333-6783 deirdre.pfeiffer@asu.edu OVERVIEW Education University of California Los Angeles, Los Angeles, CA Ph.D., Urban Planning, June 2011 Dissertation: “Sprawling to Opportunity: Los Angeles African Americans on the Exurban Frontier,” Committee Co-Chairs: Dr. Anastasia Loukaitou-Sideris and Dr. Paul Ong M.A.,...»

«eˇ Akademie vˇd Cesk´ republiky e Teze doktorsk´ disertaˇn´ pr´ce e cı a k z´ an´ vˇdeck´ho titulu ”doktor vˇd” ısk´ ı e e e ve skupinˇ vˇd fyzik´lnˇ matematick´ch ee ae y Structure and Properties of Exotic Nuclei using Radioactive Nuclear Beams n´zev disertace a Komise pro obhajoby doktorsk´ch disertac´ v oboru y ı jadern´, subjadern´ a matematick´ fyziky e e e Jm´no uchazeˇe. Zdenˇk Dlouh´ e c e y ´ ˇ ˇz Pracoviˇtˇ uchazeˇe. UJF, AVCR, Reˇ se c M´...»

«ARTICLES SIGNIFICANT SILENCES: FREEDOM OF SPEECH IN THE PUBLIC SECTOR WORKPLACE TONI M. MASSARO INTRODUCTION I. PREVAILING DOCTRINE. WHO ARE THE PUBLIC EMPLOYEES? A. 6 B. THE DOCTRINE 17 C. ADDITIONAL OBSTACLES TO FREE SPEECH CLAIMS. 20 D. LOWER COURT APPLICATIONS 25 II. CRITIQUE 25 A. ANALYTICAL PROBLEMS 25 1. Public Concerns 33 2. Disruption of Government Operation. 38 B. CONSTITUTIONAL VALUES 38 The PoliticalProcess Theory 1. 43 The Marketplace of Ideas Theory. 2. 46 The PluralValues...»





 
<<  HOME   |    CONTACTS
2016 www.dissertation.xlibx.info - Dissertations, online materials

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.