SEED: Confidential Big Data Workflow Scheduling with Intel SGX Under

SEED: Confidential Big Data Workflow Scheduling with Intel SGX Under

SEED: Confidential Big Data Workflow Scheduling with Intel SGX Under Deadline Constraints Ishtiaq Ahmed, Saeid Mofrad, Shiyong Lu, Fengwei Zhang* Dunren Che Changxin Bai Department of Computer Science School of Computing Department of Computer Science and Engineering Southern Illinois University Wayne State University Southern University of Carbondale, Illinois, USA Detroit, Michigan, USA Science and Technology Email: [email protected] Email: fishtiaq, saeid.mofrad, shiyong Shenzhen, Guangdong, China [email protected] Email: [email protected] Abstract—Recently, cloud platforms play an essential role in then by using those vulnerabilities, getting unauthorized large-scale big data analytics and especially running scientific access, or modifying workflow tasks’ code and data. Another workflows. In contrast to traditional on-premise computing main challenge of using cloud computing is the optimization environments, where the number of resources is bounded, cloud computing can provide practically unlimited resources of performance, cost and/or their trade-off, since using VMs to a workflow application based on a pay-as-you-go pricing in the cloud is costly and the use of more VMs does not model. One challenge of using cloud computing is the pro- necessarily imply better performance due to data movement, tection of the privacy of the confidential workflow’s tasks, the time cost of provisioning and de-provisioning VMs, and whose proprietary algorithm implementations are intellectual the inherent structure of workflow applications. To address properties of the respective stakeholders. Another one is the monetary cost optimization of executing workflows in the cloud these issues, the big data workflow scheduling problem is while satisfying a user-defined deadline. In this paper, we formulated to answer a series of questions: given a workflow use the Intel Software Guard eXtensions (SGX) as a Trusted w, how many VMs are needed? When do these VMs need Execution Environment (TEE) to support the confidentiality to be provisioned and de-provisioned? To which VM should of individual workflow tasks. Based on this, we propose a workflow task be assigned and when? Which data product a deadline-constrained and SGX-aware workflow scheduling algorithm, called SEED (SGX, Efficient, Effective, Deadline should be moved from which VM to which VM and when? Constrained), to address these two challenges. SEED features When is a workflow task ready to be executed? And, how several heuristics, including exploiting the longest critical shall we measure the performance of a workflow execution paths and reuse of extra times in existing virtual machine in time and monetary cost? One sub-problem is the so- instances. Our experiments show that SEED outperforms the called deadline-constrained big data workflow scheduling representative algorithm, IC-PCP, in most cases in monetary cost while satisfying the given user-defined deadline. To our problem, which focuses on the monetary cost optimization best knowledge, this is the first workflow scheduling algorithm of executing workflows in the cloud while satisfying a user- that considers protecting the confidentiality of workflow tasks defined deadline. However, existing workflow scheduling in a public cloud computing environment. algorithms have not considered the presence of confidential Keywords-Scientific workflows, Cloud computing, Confiden- workflow’ tasks, which need their confidentiality to be as- tial workflows, Confidential big data processing, Intel SGX and sured, during their execution in a public cloud. In this paper, big data security we leverage Intel Software Guard eXtensions (SGX) [6] I. INTRODUCTION as a tool to create a trusted execution environment (TEE) Recently, cloud platforms play an essential role in large- that guarantees the confidentiality of individual workflow’s scale big data analytics and especially running scientific tasks and data during the runtime. Intel SGX is a set of workflows [1]. Cloud platforms provide a cost-efficient and new CPU instructions introduced to the x86 architecture, enormous amount of computing and storage resources to aiming to provide confidentiality of code and data at runtime. workflow applications and help them handle more extensive Intel SGX enables users to create a secure and encrypted and more complex scientific problems, also known as big area referred to as enclave inside the system memory that data scientific workflows [2]–[5]. One main challenge of protects the confidentiality of code and data against strong using cloud computing is protecting the confidentiality of the adversaries. Therefore, when workflow tasks are executed confidential workflow’s tasks, whose proprietary algorithm inside enclaves, their confidentiality is assured. implementations are the intellectual properties of the respec- The main contributions of this paper are as following: tive stakeholders. Virtual machines (VM)s in the cloud are 1)- We propose a novel deadline-constrained and SGX- often subject to insider or outsider attacks, including hyper- aware big data workflow scheduling algorithm, SEED (SGX, visor attacks. External adversaries may find vulnerabilities in Efficient, Effective, Deadline Constrained), that considers the cloud hypervisor or cloud system management software, confidential tasks, which will be executed in some dedicated SGX-enabled machines. Fengwei Zhang* is the corresponding author. 2)- SEED features several heuristics, including exploiting + the longest critical paths and reuse of extra times in exist- • DSize : D ! R is the data product size function, ing VMs. Our experiments show that SEED outperforms and DSize(Di;j) returns the size of data product Di;j the representative algorithm, IC-PCP [7], in most cases in MB. in monetary cost while satisfying the given user-defined As our algorithm requires two dummy nodes Tstart and deadline. Our comparison uses the C score, a performance Tend, they are connected with zero execution time and zero metric introduced to compare deadline-constrained workflow transfer time to the workflow from beginning and end points scheduling algorithms that aim to minimize monetary cost. to avoid having multiple starting and exit nodes. A sample 3)- The proposed SEED, as well as IC-PCP, have been workflow is shown in Figure 1, depicting all tasks and their implemented in a modified version of DATAVIEW, which dependencies in between, a start node and an end node. is one of the most usable big data workflow management systems in the community, to support confidential tasks B. Problem definition in a workflow DAG with Intel SGX. Our experiments Given a DAG workflow W , actual finish time AF T demonstrate the feasibility and usability of the proposed of each of the task and a deadline δ,an IaaS computing approach. environment C, the deadline-constrained workflow schedul- ing problem is to find the optimal chedule sch that II. RELATED WORK opt optimize the operational cost of executing workflow W Though there are a number of strategies to solve schedul- within deadline δ [16]: ing problems in the clouds, there remains an opportunity to get better result considering QoS. Several metaheuristic schopt = arg min WC(sch) sch approaches, such as particle swarm optimization (PSO) and (1) subject to sch:AF T (sch:t ) δ genetic algorithm (GA) on grids and clouds, are found in exit 6 C. Some definitions the literature [8] which demand a longer period to achieve satisfactory result. An alternate approach [9] optimizes the In order to understand our proposed algorithms, some number of resources that need to be granted for minimizing basic definitions are needed. the execution cost. In [10], VM possession delay was not 1) EST, EFT, and AST: The earliest start time (EST) of considered. Another “DCP-C” algorithm initiates instances a task denotes the time of the task that can executes at its on Amazon EC2 platform for task scheduling without con- earliest convenience without breaking the given constraints. sidering the transfer time from one task to another [11]. The minimum execution time (MET). SV (ti) denotes the SHEFT algorithm optimizes not only the execution time selected virtual machine instance for task ti in a particular but also the overall cost. However, SHEFT fails to achieve schedule. ET (ti; SV (ti)) stands for the execution time of significantly better performance when the number of tasks the predefined service virtual machine SV (ti) for task ti. lies under 200. Moreover, to the best of our knowledge, EST is defined by following equation: 8 >0; there is no confidential workflow scheduling algorithm in > (i) <> the literature. In [12] the capacity and implications of using max EST (tp)+ET (tp;SV (tp))+TT (ep;i); (ii) (2) t 2parents(t ) p i > Intel SGX for securing a range of applications from small > :EST (tp)+MET (tp)+TT (ep;i); (iii) application to the enterprise and cloud-based workloads has been discussed. VC3 [13] proposed a secure Map/Reduce Similarly, the earliest finish time (EFT) is defined below: framework with Intel SGX to protect the integrity and confi- 8 <>EST (ti)+ET (ti;SV (ti)); if SV (ti) is defined: dentiality of Map/Reduce job execution and its results. Also, EF T (ti)= >EST (ti)+MET (ti); otherwise: researchers in [14] used Intel SGX and AMD SEV [15] to : (3) protect the big data workflow execution in the heterogeneous Finally, AST (t ) is the actual starting time of t on a VM. cloud environments. i i 2) LFT: Latest finish time (LFT) refers to the time by III. SCHEDULING SYSTEM MODEL which an unscheduled task completes its execution so that This section describes the overall application model, cloud the whole workflow finishes without breaking the constraint resource model and problem formulation for workflow in deadline δ. Usually, LFT is calculated recursively from the clouds. end task backward in the workflow. Initially, the end task is first calibrated per the given deadline δ and other tasks’ A. Application model LF T (ti) are then derived as follows in respect to three An application model can be configured by the four conditions: i) if ti = tend, ii) if SV (tc) is defined.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us