18
VC3: Trustworthy Data Analytics in the Cloud using SGX Felix Schuster, Manuel Costa, Cedric Fournet, Christos Gkantsidis ´ Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich Microsoft Research

VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

VC3: Trustworthy Data Analytics in the Cloud using SGX

FelixSchuster∗,ManuelCosta,CedricFournet,ChristosGkantsidis´MarcusPeinado,GloriaMainar-Ruiz,MarkRussinovich

MicrosoftResearch

Page 2: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Outline

•  Introduction•  Background•  DesignOverview•  JobDeployment•  JobExecutionandVerification•  RegionalSelf-Integrity•  Implementation•  Evaluation•  RelatedWork•  Conclusion

Page 3: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Introduction

• Cloudprovidersallowcomputersintodatacentersandmakethemavailableon-demand• Usershavetheabilitytorentoutcomputingcapacitytorunlarge-scaledistributedcomputationsbasedonframeworkslikeMapReduce• Amajorconcernforusersistheabilitytotrustthecloudproviderwiththeircodeanddata

Page 4: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Introduction (cont’d)

• Concerns:•  Singlemaliciousinsiderwithadminaccessinthecloudcanleakormanipulatesensitiveuserdata•  Externalattackersattempttoaccessdata(e.g.exploitvulnerabilitiesinanOS)•  Externalattackersmaytamperwithusers’computations

• CloudUserExpectations•  Confidentialityandintegrityforbothcodeanddata•  Verifiabilityofexecutionofthecodeoverdata

• MultipartycomputationtechniquesmayaddressthesedemandsusingFullyHomomorphicEncryption(FHE)•  However,FHEisnotefficientformostcomputations

Page 5: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Introduction (cont’d)

• VerifiableConfidentialCloudComputing(VC3)•  AsystemthatallowsuserstorunMapReducecomputationsinthecloudwhilekeepingtheircodeanddatasecretandensuringcorrectnessandcompletenessoftheirresults

•  ThreatModel•  Powerfulattackersthatmayhavetheabilitytocontrolthewholecloudproviderssoftwareandhardwareinfrastructure

•  ToolsUsed•  TrustedSGXprocessors•  RananunmodifiedHadoop

Page 6: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Introduction (cont’d)

• Challenges:•  PartitionthesystemintotrustedanduntrustedpartstominimizeitsTCB•  Guaranteeintegrityforthewholedistributedcomputation•  Protectthecoderunningintheisolatedmemoryregionsfromattacksduetounsafememoryaccesses

Page 7: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Background

• MapReduce•  Apopularprogrammingmodelforprocessinglargedatasets:userswritemapandreducefunctions,andexecutionoffunctionsisautomaticallyparallelizedanddistributed

•  IntelSGX•  Setofx86-64ISAextensions

•  Setsupprotectedexecutionenvironments(calledenclaves)withoutrequiringtrustinanythingbutprocessorandcodeputintheenclaves

Page 8: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Adversary Model

• Awareofexternalattackersthatmaytrytocontroltheentiresoftwarestackinacloudprovider’sinfrastructure,includingthehypervisorandOS• AssumetheattackerisunabletophysicallyopenandmanipulatetatleasttheSGX-enabledprocessorpackages

Page 9: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Design Overview

• Goal:Maintainconfidentialityandintegrityofcodeanddata• ResearchersdesignedVC3toachievegoodperformanceandkeeplargesoftwarecomponentsoutoftheTCB• VC3allowsuserstoimplementMapReducejobsbywriting,testing,anddebuggingmapandreducefunctions• Whenmapandreducefunctionsarereadyforproduction,userscompileandencryptthecode,andobtainaprivateenclaveE-code•  Inthecloud,enclavescontainingE-andE+areinitializedandl

Page 10: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Design Overview

Page 11: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Job Deployment

• Afterthedeploymentofauserscodetothecloud,cryptographicprotocolsareexchangedandtheactualMapReducejobexecutionstarts• CloudAttestation

•  SGXremoteattestationforenclavesisachievedthroughquotesissuedbyQE•  Threatmodelexcludesphysicalattacks,todefendagainstsuchattacks,theyusedanadditionalCloudQE•  CloudQEwascreatedbythecloudproviderwhenanewSGX-enabledsystemiscreated

Page 12: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Job Deployment

• KeyExchange•  ToexecuteMapReducejobs,enclavesneedtogetkeystodecrypttheresults•  ResearcherscreatedtheirownkeyexchangeprotocolwhichisdesignedtoimplementaconventionalMapReducejobthatworkswithHadoop

Page 13: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Job Execution & Verification

• Keyexchangesandencryptioncodewillhelpcodeanddatabesafefromattacks• ResearchershavetoencryptdatainaMapReducejobandthiscapabilityneedstoworkwithinHadoop

Page 14: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Region Self-Integrity

•  Finalaspectofdesignistoenforcearegionofself-integrityforusercodeloadedintoenclaves•  Establishefficientcommunicationchannels

•  Leadstoabroadenattacksurfaceonenclaves•  Twosolutions:

•  Region-write-integrity•  Region-read-write-integrity

Page 15: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Discussion

•  SeveralAttackScenarios:•  InformationLeakage

•  OnebasicprincipleofMapReduceisthatkey-valuepairswiththesamekeyneedtobeprocessedbythesamereducer

•  Anetworkattackercancountthenumberofpairsbeingdeliveredandchangethepairs•  ReplayAttacks

•  AttackerscantrytofullyorpartiallyreplayapastMapReducejob

Page 16: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Implementation

• VC3wasimplementedusingC++forWindows64-bitandHDInsightdistributionofHadoop•  SGXEmulation

•  ResearchersimplementedVC3inanSGXEmulatorwhichwassuccessful•  Aswell,createdtheirownemulator,howevertheemulatordoesnotprovidesecurityguarantees

Page 17: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Evaluation

• Researcherschoseamixofreal-worldapplicationsandbenchmarkstoevaluatetheVC3system•  ThefollowingtableshowstheapplicationsusedtoevaluateVC3

Page 18: VC3: Trustworthy Data Analytics in the Cloud using SGXwebpages.eng.wayne.edu/~fy8421/18fa-csc6991/slides/shikha-vc3.pdf · Microsoft Research Outline • Introduction • Background

Conclusion

• VC3createdasanapproachfortheverifiableandconfidentialexecutionofMapReducejobsinuntrustedcloudenvironments• VC3isabletobesuccessfulimplementedandhasstrongsecurityguarantees• VC3isabletoachievesecurecloudcomputations