Exploring Attacks and Information Leakage in Third-Party Cloud Computing by Rohit Ranchal - PowerPoint PPT Presentation

About This Presentation
Title:

Exploring Attacks and Information Leakage in Third-Party Cloud Computing by Rohit Ranchal

Description:

Rohit Last modified by: Rohit Created Date: 8/16/2006 12:00:00 AM Document presentation format: On-screen Show (4:3) Other titles: Lucida Sans Unicode Arial Wingdings ... – PowerPoint PPT presentation

Number of Views:108
Avg rating:3.0/5.0
Slides: 7
Provided by: ROHIT11
Category:

less

Transcript and Presenter's Notes

Title: Exploring Attacks and Information Leakage in Third-Party Cloud Computing by Rohit Ranchal


1
Exploring Attacks and Information Leakage in
Third-Party Cloud Computingby Rohit Ranchal
  • References
  • Hey, You, Get Off My Cloud Exploring
    Information Leakage in Third-Party Compute
    Clouds by Thomas Ristenpart, Eran Tromer UC
    San Diego Hovav Shacham, Stefan Savage MIT
    Cambridge

2
Third Party Cloud Computing
  • Like Amazons EC2, Microsofts Azure
  • Allow users to instantiate Virtual Machines
  • Allow users to purchase required quantity when
    required
  • Allow service providers to maximize the
    utilization of sunk capital costs
  • Confidentiality is very important

3
Known issues Already exist
  • Confidentiality issues
  • Malicious behavior by cloud provider
  • Known risks exist in any industry practicing
    outsourcing
  • Provider and its infrastructure needs to be
    trusted

4
New Vulnerabilities Attacks
  • Threats arise from other consumers
  • Due to the subtleties of how physical resources
    can be transparently shared between VMs
  • Such attacks are based on placement and
    extraction
  • A customer VM and its adversary can be assigned
    to the same physical server
  • Adversary can penetrate the VM and violate
    customer confidentiality

5
More on attacks
  • Collaborative attacks
  • Mapping of internal cloud infrastructure
  • Identifying likely residence of a target VM
  • Instantiating new VMs until one gets co-resident
    with the target
  • Cross-VM side-channel attacks
  • Extract information from target VM on the same
    machine

6
More on attacks
  • Can one determine where in the cloud
    infrastructure an instance is located?
  • Can one easily determine if two instances are
    co-resident on the same physical machine?
  • Can an adversary launch instances that will be
    co-resident with other user instances?
  • Can an adversary exploit cross-VM information
    leakage once co-resident?
  • Answer Yes to all
Write a Comment
User Comments (0)
About PowerShow.com