• No results found

Security Infrastructure for Cloud Infrastructure as a Service (IaaS) Provisioning Model

N/A
N/A
Protected

Academic year: 2021

Share "Security Infrastructure for Cloud Infrastructure as a Service (IaaS) Provisioning Model"

Copied!
30
0
0

Loading.... (view fulltext now)

Full text

(1)

Security Infrastructure

for

Cloud Infrastructure as a Service (IaaS)

Provisioning Model

Yuri Demchenko

SNE Group, University of Amsterdam

Cloud Security Workshop, OGF31

23 March 2011, Taipei

Cloud Security Workshop -

(2)

Outline

• Security Services Models Evolution

– Security in Clouds – main issues

• Architectural Framework of the Cloud IaaS Provisioning Model

– Composable Services Architecture (CSA)

– Service Delivery Framework (SDF)

– Infrastructure Services Modeling Framework (ISMF)

• Cloud Security and Dynamic Security Services Provisioning

– Security Context Management

Cloud Security Workshop - Taipei, 23

(3)

Security Services aspects/goals

Access Control (including AuthN, AuthZ, Identity

Management)

Trust Management (including key management)

Policy Based Management (PBM)

Data protection (Confidentiality, Integrity, Access Control)

– Communication Security

– Privacy (complex of measures and policy based access

control)

Cloud Security Workshop -

(4)

Security Services Evolution

• Security services have dual task:

– Protecting/ensuring normal/secure system operation

– Protecting/providing secure access to system services

and resources

• From the beginning of computer technologies the

security services evolved from implicit/completely

integrated with the program or computer to the

composable components of the SOA based systems

– Gradually revealing their duality

Cloud Security Workshop - Taipei, 23

(5)

Security Services Evolution – until late 1960s

Computer technology and Security services evolution

• Mechanical to Electronic calculators with simple input/output

form

– Simple calculation process control is programmed as a part of the

program by using switches and stacks

– Program execution is managed and controlled by user/programmer

• No specific security services except physical security

– Examples: Calculator, Turing Machine

• Mainframe computers with single task execution in time

sharing mode

– Simple Task monitor loads tasks/jobs in a scheduled sequence

– Security services

• Physical access control via terminals which can be also physically protected • Remote terminals may use hardware data/communication protection

Cloud Security Workshop - Taipei, 23

(6)

Security Services Evolution – until 1990s

• Multi-user and multi-task mainframe computers

– Operating System performs programs, tasks and input/output

functions/devices management

• Multi-user and multi-task OS and Multi-user terminals

– Security services are applied and managed by OS itself

• Provide tasks (and user) isolation at the OS level

• User access is controlled with the remote terminal protocols

• First abstract security models: Reference Monitor, Bell-LaPadula, Biba, Clark-Wilson, Multi-Level Security (user clearance vs Data Sensitivity), RBAC

– Overall security model is defined as the Trusted Computing Base (TCB)

• Distributed systems, Open Systems, Internet

– Inter-computer communication, OSI, Internet, TCP/IP, Client/Server

model

– Two basic security models: TCB and OSI Security

• Security services are decoupled from the main services and defined as such that can be called by other services to protect their normal operation

• OSI Security Architecture proposed and standardised: ISO7498-2, ITU-T X.800 - defining multi-layer security services and mechanisms

Cloud Security Workshop - Taipei, 23

(7)

Security Services Evolution – late 1990s – late

2009

• Web based services, Web Services, Service Oriented Architecture (SOA)

– Growing amount of service, information accessed via Internet

– SOA facilitate services decomposition and decoupling of security services

• Client/server model is changed to Requestor/Provider

• SOA defines message based protocols (on the top of TCP/IP stack) – SOAP or REST/HTTP based

– Computer security is provided by OS and network security is provided by

user/terminal clients or services

• SOA/WS security model is conformant to OSI/Internet security model by adding WS related upper message layer security

• Security services are applied and managed separately by Security Management System • Definition of the Trusted Computing Platform Architecture (TCPA)

• Grid Computing

– Cooperative resources sharing for Collaborative groups called Virtual

Organisations (VO)

• Open Grid Services Architecture (OGSA) is Web Services based with defined Job management/execution framework

– OGSA Security architecture is VO and Web Services based

• Security architecture attempts to bridge two basic security models: OSI/Internet user access and job submission security and TCB based job execution security

• Security sessions context management becomes explicit task and require special mechanisms (protocols and credentials/assertions or security tokens)

Cloud Security Workshop - Taipei, 23

(8)

Security Services Evolution – since approx 2008

• Next Generation Network (NGN) and SOA based Enterprise Computing models

– Network and IT services convergence based on SOA and Web Services – Addresses service virtualisation and on-demand provisioning

• Enterprise Service Bus (ESB) as environment for dynamically re-configured virtualised composable services • Definition of the Service Delivery Framework (SDF) defining both the on-demand provisioned services lifecycle

and service delivery and operation supporting infrastructure and business model – Federated access control to distributed multidomain services and resources

• Security services are becoming dynamically composable services however (manually) pre-configured • Dynamic security association and security context management in multidomain environment

• Security services lifecycle management as composable services

• Emerging Cloud Computing

– Emerging as a common access method to complex infrastructure services/resources provisioned on-demand

• (Infrastructure, Platform, Software) as a Service provisioning models • Services and resources are based on virtualisation

• Services are provisioned on demand and typically require/follow standard Service Delivery workflow

• There is no well-defined architecture frameworks yet

There is no well defined security model or security architecture

• Security paradigm change due to the fact that user data are processed in uncontrolled for user environment • Current security model is based on SLA contracted between user and provider and enforced by provider • Require solutions/mechanisms to enable trusted remote platform for users

• Security context and lifecycle management

• Prospective security architecture should support both dynamic provisioning environment and dynamic security services provisioning

• Potentially interest will return to using Trusted Computing Platform Architecture

• Promising/emerging research on homomorphic/elastic encryption (recently proposed by Stanford Univ.)

Cloud Security Workshop - Taipei, 23

(9)

Use case for Infrastructure Services Provisioning

Cloud IaaS Security 9

Control & Monitoring Sc. Instrument (Manufactrg) Grid Storage T1 Grid CE Data Filtering Grid Storage T0 Grid VO-A Visuali- sation User Group A User CE Campus A Visuali- sation User CE User Group B Campus B CE CE CE SE SE CSE CSE CSE CSE CloudSE T1 CE Processed Data Experimental Data Specialist Data Processing Project based Cloud Infrastructure Data Filtering Ctrl&Mngnt Plane

Project based Collaborating user groups located in remote campuses on data intensive

projects requiring high performance computing and rich visualisation

Grid based core eScience Infrastructure including data intensive scientific instrument Campus infrastructure including visualisation tools Cloud infrastructure provisioned on demand

Cloud Security Workshop - Taipei, 23 march 2011

(10)

Proposed Architectural Framework for Cloud IaaS

The proposed framework should support on-demand infrastructure

services provisioning and operation

Composable Services Architecture (CSA)

that intends to provide a

conceptual and methodological framework for developing dynamically

configurable virtualised infrastructure services

Service Delivery Framework (SDF)

that provides a basis for defining the

whole composable services life cycle management and supporting

infrastructure services

Infrastructure Services Modeling Framework (ISMF)

that provides a

basis for the infrastructure resources virtualisation and management,

including description, discovery, modeling, composition and monitoring

• (Optionally) Service Control and Management Plane/Framework may

be defined as combination of management functionality in all 3

components

Security services/infrastructure have a dual role:

– Virtual Security Infrastructure - provisioned as a part of virtualised

infrastructure

– Support normal/secure operation of the whole provisioning framework

Cloud Security Workshop -

(11)

IaaS General Model

Cloud Security Workshop -

Taipei, 23 march 2011 Cloud IaaS Security 11

User/ Applic B User/ Applic A VRI2 VRI4 VRI5 VRI6 VRI2 VRI1 VI Operator Layer

PIP1 PIP2 PIP3 PIP4

Virtual Infrastructure (VI) (operated by VIO1)

VIProvider2 ND-PIP1 ND-VIP1 ND-PIP2 ND-PIP3-PIP4 ND-VIP2 ND-VIO1 UserND-A UserND-B PI Provider Layer VI Provider Layer VIProvider1

VI/VR Adaptation Layer

Pi/PR Adaptation Layer

Pi/PR Layer C om pos it io n Logic al R s r AAI/Policy Security SLC Metadada Application/Service Layer C trl & M ngnt (Orc hes trat n )

Logical Abstraction Layer

Security Context Resource

Config

VI Comp & Mngnt Layer (VICM)

VR1 VR2 VR3 VR4 VR5 VR6

VIO1

SLA/ SLM

(12)

Virtual Infrastructure Composition and Management

(VICM) Layer Operation

Main actors involved into provisioning process

– Physical Infrastructure Provider (PIP) – Virtual Infrastructure Provider (VIP) – Virtual Infrastructure Operator (VIO)

Virtual Infrastructure Composition and Management (VICM) layer includes

– VICM middleware - defined as CSA

– Logical Abstraction Layer and the VI/VR Adaptation Layer facing correspondingly lower PIP and upper Application layer.

The infrastructure provisioning process includes the following main stages

– (1) virtual infrastructure creation request

– (2) infrastructure planning and advance reservation;

– (3) infrastructure deployment including services synchronization and initiation; – (4) operation stage

– (5) infrastructure decommissioning

VICM redefines Logical Infrastructure Composition Layer (LICL) proposed by

GEYSERS project

– Basic functionality is implemented as GEMBus/CSA Cloud Security Workshop -

(13)

ISMF – Virtual Resource Lifecycle

Cloud Security Workshop -

Taipei, 23 march 2011 Cloud IaaS Security 13

{LR0} -> LR2 Planning Composition Reservation LR2 -> VR VI Deployment Ph y sica l Re sou rce Lo gi cal Re sou rce Virtua l Re sou rce Network Segment Network Segment LR0 Re-usable (Published) PRs Topology Pool Network Segment PR-LR1 Config& Instantiation Registered PRs Composed LRs Deployed VRs . Virtua l Infrastructure PIP1 PIP2

(14)

ISMF - Relation between PR-LR-VR-VI

• Virtual Resource lifecycle – defines relations between different resource

presentations along the provisioning process

• Physical Resource information is published by PIP to the Registry service

serving VICM and VIP

– Logical Resource representing PR includes also properties that define possible (topological) operations on the PR, such as e.g. partitioning or aggregation.

• Published LR information presented in the commonly adopted form (using

common data or semantic model) is then used by VICM/VIP composition

service to create requested infrastructure as combination of (instantiated)

Virtual Resources and interconnecting them with the available network

infrastructure

• Network infrastructure can be composed of a few network segments (from

the network topology pool) run by different network providers.

• Composed LRs are deployed as VRI/VI to VIP/VIO and as

virtualised/instantiated PR-LR to PIP

• Resource/service description format considered

– NDL/NML (Network Description Language / Network Markup Language at OGF) – USDL (Unified Services Description Language) at W3C

– VXDL infrastructure service request format by INRIA

Cloud Security Workshop -

(15)

Composable Services Architecture (CSA)

• Defined as middleware for on-demand provisioned

Composable Services

• Proposed in the GEANT3 JRA3 Composable

Services project

• Implemented as GEMBus (GEANT Multidomain

Bus)

Cloud Security Workshop -

(16)

Composable Services Architecture – Version 0.13

Cloud Security Workshop - Taipei, 23

march 2011 Cloud IaaS Security Slide_16

Applications and User Terminals

Composition Layer/Serv (Reservation SLA

Negotiatn)

Logical Abstraction Layer for

Component Services and Resources Control & Management Plane (Operation, Orchestration) Composable Services Middleware (GEMBus) Network Infrastructure Compute Resources Storage Resources

Component Services & Resources

Proxy (adaptors/containers) - Component Services and Resources Proxy (adaptors/containers) – Composed/Virtualised Services and Resources

MD SLC Registry Logging Security

User Client Composable Services lifecycle/provisioning stages (1) Request (2) Composition/ Reservation (3) Deployment (4) Operation (5) Decommissioning Control/ Mngnt Links Data Links

(17)

Composable Services Lifecycle/Provisioning

Workflow

• Main stages/phases

– Service Request (including SLA negotiation)

– Composition/Reservation (aka design)

– Deployment, including

Reqistration/Synchronisation – Operation (including Monitoring) – Decommissioning

• Additional stages

– Re-Composition should address incremental infrastructure

changes

– Recovery/Migration can use SL-MD to initiate resources

re-synchronisation but may require re-composition

• The whole workflow is

supported by the Service

Lifecycle Metadata Service (SL MD)

Cloud Security Workshop - Taipei, 23

march 2011 Cloud IaaS Security Slide_17

Service Request/ SLA Negotiation Composition/ Reservation Deployment Operation (Monitoring) Decommissioning Registr&Synchro Recovery/ Migration Re-Compo sition Service Lifecycle Metadata Service (SL MD) Provisiong Session Managnt

(18)

Cloud Security – Issues and problem environment

• Virtualised services

• On-demand/dynamic provisioning

• Multi-tenant/multi-user

• Multi-domain

• Uncontrolled execution and data storage environment

– Data protection

• Trusted Computing Platform Architecture (TCPA) • Promising homomorphic/elastic encryption

• Bootstrapping virtualised security infrastructure and virtualisation

platform

• Integration with legacy security services/infrastructure of the

providers

• Integration with the providers business workflow

Cloud Security Workshop -

(19)

Current Cloud Security Model

• SLA based security model

– SLA between provider and user defines the provider responsibility and

guarantee

– Providers undergo certification

– Standard business model

• Using VPN and SSH keys generated for user infrastructure/VMs

– Works for single Cloud provider

• Has inherited key management problems

• Not easy integration with legacy physical resources

• Not scalable

• Simple access control, however can be installed by user

• Trade-off between simplicity and manageability

Cloud Security Workshop -

(20)

Security Infrastructure for IaaS

Cloud Security Workshop -

Taipei, 23 march 2011 Cloud IaaS Security 20

User/ Applic B (TA0.B) User/ Applic A (TA0.A) VIR3 VIR4 VIR5 VIR6 VIR2 VIR1 VI Operator Layer TA1.x PIP1(TA3.1)

Virtual Infrastructure (VI) (operated by VIO1)

TD-PIP1 TD-VIP1 TD-PIP2 FedTD-PIP3-PIP4 TD-VIP2 TD/DSA VIO1 User B Trust Domain PI Provider (PR) Layer TA3.x VI Provider (VR/LR) Layer TA2.x

VI/VR Adaptation Layer

Pi/PR Adaptation Layer

Pi/PR Layer Com p o sition L o g ical Rsr AAI/Policy Security SLC Metadada Application/Service Layer Ctrl & M n g n t (Orch e strat n )

Logical Abstraction Layer

Security Context Resource

Config

VI Comp & Mngnt Layer (VICM)

VR1 VR2 VR3 VR4 VR5 VR6

VIO1 (TA1, DSA)

SLA/ SLM

PIP1(TA3.2) PIP1(TA3.3) PIP1(TA3.4)

User B Trust Domain

DSA

Legend

- DSA Security Context/ Configuration

TD* - Trust Domains

DSA – Dynamic Security Assoc. VIR* - VI Resource (deployed) VR/LR/PR – Virtual/Logical/ Physical Resource

VIProvider1 (TA2.1) VIProvider2 (TA2.2)

(21)

Cloud Security Workshop - Taipei, 23

march 2011 Cloud IaaS Security Slide_21

Security Services Lifecycle Management Model

Specific SSLM stages and mechanisms to ensure consistency of the security context management

Security Service Request that initiates creation of the dynamic security association and may use SLA security context.

Reservation Session Binding with GRI (also a part of general SDF/SLM) that provides support for complex reservation process including required access control and policy enforcement.

Registration&Synchronisation stage (as part Deployment stage) that allows binding the local resource or hosting platform run-time process ID to the GRI as a provisioning session ID. Specifically targets possible scenarios with the provisioned services migration or

restoration. Service Request (GRI) Planning Design Reservation

Deployment Operation Monitoring Decom- missioning

Operation Monitoring Decommis Key Recycle Resrv Session Binding SecServ Request Deploy Rtm Bind Bootstr Reqistr Synchron B) Service Lifecycle

(22)

Security Context Management in VI/IaaS

Cloud Security Workshop -

Taipei, 23 march 2011 Cloud IaaS Security 22

VIO VIP VIP DACI/AAI

VI reservation request (including VIO TA1)

AuthZ request (VI-GRI)

PIP(s)

Mapping from the returned PR-LRI to VR-GRI for VIP

Reserve complex resource at PIP(s) in daisy-chain mode or concurrent mode VR reservation request

(including VIP TA2)

Reservation confirmation with PR-LRI of committed PR

VI reservation response with a VI-GRI and set of VR-GRI(s)

Generate a VI-GRI

PIP AAI

AuthZ request (PR-LRI) User/Applicatn

VI/VR Request (TA0) SLA Negotiation SDF Stages

VR’s . PR’s

DACI

Deployment stage – VI/VR Configuration, DACI configuration and Security context distribution

Operation stage – VI/VR Management, Monitoring, DACI operation and security context management

Dec``ommissioning stage – VI/VR teardown, resources release, security context recycling

SLA Negotiation Planning, Reservation Deployment, Activation Operation Decommissioning Generate GRI Return GRI

(23)

AAI in GEYSERS (1)

Authentication and Authorization Infrastructure (AAI) functionalities

• Access control: interfaces, VI provisioning service

– Authentication – standard implementation

– Authorization – primary focus

– Identity management – to support multi-domain attributes management

• Security context management for VI provisioning service

– Cross-layer/multi-layer

– Inter-domain/dynamic security associations

– Lifecycle and provisioning session security context

• Dynamic access control services/infrastructure

– Security Services Lifecycle Management (SSLM)

– Dynamic security/trust associations management

.

Cloud Security Workshop -

(24)

AAI in GEYSERS (2)

Basic CSSI services

Data encryption

Digital signature

Authentication

Authorization

Policy management

Security session and

context management

CSSI – Common Security

Services Interface

SML NCP LICL VITM NIPS Server CCI NIPS-UNI SLI NLI PHY LPI GEYSE RS Securi ty (AAI) CSSI

Cloud Security Workshop -

(25)

AAI in GEYSERS (3)

Multi-domain and Multi-layer Environment

SML NCP Upper-LICL PHY1 Lower-LICL PHY2 Lower-LICL AuthN Service TVS AuthN Service TV S AuthN Service TVS AuthZ Svc AuthZ Service AuthN Service TV S AuthZ Service AuthN Service TVS AuthZ Svc PIP Security domains VIP/VIOSecurity domain

Must provide AuthN assertion and support GRI and VI SecCtx

Cloud Security Workshop -

(26)

Additional Information

• Using AuthZ tickets and tokens for access control

and signaling

Cloud Security Workshop - Taipei, 23

(27)

Access Token and Pilot Token Types

AType 0

– Simple access token (refers to the reserved resources context)

AType 1

– Access token containing Obligations collected from previous domains

PType 0

– Container for GRI only

PType 1

– Container for communicating the GRI during the reservation stage

– Contains the mandatory SessionId=GRI attribute and an optional Condition element

PType 2

– Origin/requestor authenticating token

– TokenValue element contains a value that can be used as the authentication value for the token origin

– TokenValue may be calculated of the (GRI, IssuerId, TokenId) by applying e.g. HMAC function with the requestor’s symmetric or private key.

PType 3

– Extends Type 2 with the Domains element that allows collecting

domains security context information when passing multiple domains during the

reservation process

– Domains’ context may include the previous token and the domain’s trust anchor or public key

PType 4

– Used at the deployment stage and can communicate between

domains security context information about all participating in the provisioned

lightpath or network infrastructure resources

– Can be used for programming/setting up a TVS infrastructure for consistent access control tokens processing at the resource access stage

Cloud Security Workshop -

(28)

Cloud IaaS Security Slide_28

General XML Token Format – Access Token and Pilot

Token

Required functionality to support

multidomain provisioning scenarios

 Allows easy mapping to SAML and

XACML related elements

Allows multiple Attributes format

(semantics, namespaces)

Establish and maintain Trust relations

between domains

 Including Delegation

Ensure Integrity of the AuthZ decision

 Keeps AuthN/AuthZ context

 Allow Obligated Decisions (e.g.

XACML)

Cloud Security Workshop - Taipei, 23 march 2011

(29)

Cloud IaaS Security Slide_29

XML Token Example – Access Token Type 0

<AAA:AuthzToken xmlns:AAA="http://www.aaauthreach.org/ns/#AAA" Issuer="urn:aaa:gaaapi:token:TVS" type=“access-type0" SessionId="a9bcf23e70dc0a0cd992bd24e37404c9e1709afb" TokenId="d1384ab54bd464d95549ee65cb172eb7"> <AAA:TokenValue>ebd93120d4337bc3b959b2053e25ca5271a1c17e</AAA:TokenValue > <AAA:Conditions NotBefore="2007-08-12T16:00:29.593Z" NotOnOrAfter="2007-08-13T16:00:29.593Z"/> </AAA:AuthzToken> • where

SessionId = GRI (Global Reservation Id)

TokenId – unique identifier (serving for logging and accountability)

TokenValue – generated securely from (GRI, TokenId, DomainId, TokenKey), or AuthzTicket (digital SignatureValue)

– The element <TokenValue> and attributes SessionId and TokenId are mandatory, and the element <Conditions> and attributes Issuer, NotBefore, NotOnOrAfter are optional – Binary token contains just two values – TokenValue and GRI

Cloud Security Workshop - Taipei, 23 march 2011

(30)

Cloud IaaS Security Slide_30

Chaining Pilot Tokens in multidomain/multiprovider

signalling

• Pilot Token

type 3

Domain1

“viola”

Resource

Requestor

Domain2

“uva”

Domain3

“uclp”

<AAA:AuthzToken xmlns:AAA="http://www.aaauthreach.org/ns/AAA"

Issuer=http://testbed.ist-phosphorus.eu/uva/AAA/TVS/tokenpilot

SessionId="740b241e711ece3b128c97f990c282adcbf476bb"

TokenId="dc58b505f9690692f7a6312912d0fb4c" type="pilot-type3"> <AAA:TokenValue>190a3c1554a500e912ea75a367c822c09eceaa2f </AAA:TokenValue>

<AAA:Conditions NotBefore="2009-01-30T08:57:40.462Z" NotOnOrAfter="2009-01-30T09:21:40.462Z"/> <AAA:DomainsContext>

<AAA:Domain domainId="http://testbed.ist-phosphorus.eu/viola">

<AAA:AuthzToken Issuer="http://testbed.ist-phosphorus.eu/viola/aaa/TVS/token-pilot«

SessionId="2515ab7803a86397f3d60c670d199010aa96cb51" TokenId="c44a2f5f70346fdc2a2244fecbcdd244"> <AAA:TokenValue>dee1c29719b9098b361cab4cfcd086700ca2f414 </AAA:TokenValue> <AAA:Conditions NotBefore="2009-01-30T07:57:35.227Z" NotOnOrAfter="2009-01-31T07:57:35.227Z"/> </AAA:AuthzToken>

<AAA:KeyInfo> http://testbed.ist-phosphorus.eu/viola/_public_key_ </AAA:KeyInfo> </AAA:Domain>

</AAA:DomainsContext> </AAA:AuthzToken>

Cloud Security Workshop - Taipei, 23 march 2011

References

Related documents

While direct support to federal, state and local border security and immigration enforcement can help deter illegal cross-border smuggling, military activity in

Disease is indicated by the 6' Cusp, 6th house, planets in the constellation of the occupants of the 6th house, the occupants of the &amp;I' house, the planets in the constellation

These discount cards also may include other benefits, such as patient advocacy services, identity theft protection, and even legal plans comparable to those described earlier.

But 72.2% mothers performed average practice of diarrhoeal management at home; while 9.3% mother’s had good practice in this study [Table 1] 20.58% mothers had no experience to

The ATS Entities moved to strike the following areas of Morgan's testimony: (1) Testimony regarding Fiztley's out of service percentages and safety ratings; (2) Testimo- ny

Solvents lower the viscosity of the asphalt cement in order to apply cutbacks with less heat, at lower pavement temperatures (such as wintertime surface treatments), or allow

Among these are the following: making the linguistic and cultural experience a central component in teacher training; fostering the role of university students as true

• Debride burn for no longer than 30-45 minutes • Cover wound with cadaver split thickness skin • Attempt to remove entire burn within 7-10 days • Remove heterograft and