Secure Cryptography Infrastructures in the Cloud

Secure Cryptography Infrastructures in the Cloud

Secure Cryptography Infrastructures in the Cloud Dawei Chu∗‡, Kaijie Zhux, Quanwei Cai∗†, Jingqiang Lin∗†‡, Fengjun Li], Le Guan{, Lingchen Zhang∗† ∗State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences yData Assurance and Communication Security Research Center, Chinese Academy of Sciences xNational Digital Switching System Engineering & Technological R&D Center, CHINA zSchool of Cyber Security, University of Chinese Academy of Sciences ]Department of Electrical Engineering and Computer Science, The University of Kansas, USA {Department of Computer Science, University of Georgia, USA Abstract—Information systems are deployed in clouds as virtu- Virtualization technologies and cloud solutions offer the po- al machines (VMs) for better agility, elasticity and reliability. It is tentials to mitigate the threats to cryptographic keys and build necessary to safekeep their cryptographic keys, e.g., the private cryptography infrastructures for all VMs in the cloud. Firstly, keys used in TLS and SSH, against various attacks. However, existing virtualization solutions do not improve the cryptography if a virtualization platform builds cryptography services for facilities of in-cloud systems. This paper presents SECRIN, a se- VMs, the keys will be decoupled from the VMs’ memory cure cryptography infrastructure for VMs in the cloud. SECRIN space. All computations with keys will be performed in the is composed of a) virtual cryptographic devices implemented VM monitor (VMM), so the attack resilience is significantly in VM monitors (VMMs), and b) a device management tool improved – if a VM is under attacks [1]–[4] or even com- integrated in the virtualization management system. A virtual device receives requests from VMs, computes with cryptographic pletely compromised, the keys are still kept secret. Secondly, keys within the VMM and returns results. The keys appear only compared with conventional solutions that keep cryptographic in the VMM’s memory space, so that they are kept secret even keys within the VMs, hosting the keys in the VMM does not if the VMs were compromised. With the management tool, the introduce extra threats, because these sensitive data are always operator of virtualization management systems assigns virtual accessible to the VMM when they are in VMs. Finally, cryp- cryptographic devices to a VM as well as other resources, while the tenant (or owner) of a VM still holds proper controls on the tographic facilities are managed in an agile and elastic manner keys. The virtual devices work compatibly with live migration, (as well as other resources), and reliable cryptography services and the cryptographic computations are not interrupted when benefit from live migration of the virtualization platform. the VMs are moving from a host to another. We develop the We present SECRIN, a secure cryptography infrastructure SECRIN prototype with KVM-QEMU and oVirt. Experimental in the cloud. It provides cryptography services for VMs with results show that, it works compatibly with existing virtualization solutions, provides reliable cryptographic computing services for enhanced protections on the keys. SECRIN takes advantage applications, and is secure against attacks happening in VMs. of the isolation mechanism from virtualization technologies, and the cryptographic computations are implemented as virtual I. INTRODUCTION devices, called virtio-ct. The virtual devices are implemented Various information systems are deployed as virtual ma- within VMMs, so that the keys appear as plaintext only in the chines (VMs) on Amazon EC2, Microsoft Azure, Alibaba VMM’s memory space and never in VMs. Aliyun and other virtualization platforms. Virtualization plat- To improve its usability, SECRIN integrates the manage- forms maintain computation, network and storage resources ment of cryptographic devices into the virtualization manage- for tenants with better agility, elasticity and reliability; howev- ment system. In a cloud platform, all computation, network er, the cryptography facilities of VMs are not well improved and storage resources are coordinated by the virtualization in existing virtualization solutions. Meanwhile, deployed in management system [7]. The virtual devices of SECRIN are virtualized (or conventional) environments, information sys- managed in the same way as other cloud resources, while the tems still depend on cryptography (in particular, the semantic tenants hold proper controls on the keys. When a virtio-ct security of cryptographic algorithms and the confidentiality of device is not mounted, its keys are encrypted by a password. cryptographic keys) to provide secure services. While secure Once a (remote) tenant is booting his/her VM that is config- algorithms are generally available, it is difficult to ensure the ured with a virtio-ct device, he/she is prompted to enter the confidentiality of keys. For example, TLS and SSH servers password. This password is securely transported to the host, shall protect their private keys against various attacks [1]–[6]; to decrypt the key file and then to activate the virtual device. otherwise, the attackers would exploit the compromised keys SECRIN also works compatibly with live migration, to provide to decrypt messages or impersonate the owners of the keys. reliable services. When it is serving for the applications in Dawei Chu and Kaijie Zhu are co-first authors, and Quanwei Cai is a VM and the VM is moving from a host to another, the the corresponding author (Email: [email protected]). This work was cryptographic computations of SECRIN (and the applications partially supported by National Natural Science Foundation of China (Award in this VM) are not interrupted. 61772518), National Key R&D Plan of China (Award 2017YFB0802100), NSF DGE #1565570, NSA SoS Initiative #H98230-18-D-0009 and the Ripple We develop the prototype system with open-source VMMs University Blockchain Research Initiative. and virtualization management systems, i.e., KVM-QEMU 978-1-7281-0962-6/19/$31.00 ©2019 IEEE Authorized licensed use limited to: University of Kansas Libraries. Downloaded on August 13,2021 at 20:31:17 UTC from IEEE Xplore. Restrictions apply. III. SECRIN: SECURE CRYPTOGRAPHY INFRASTRUCTURES IN THE CLOUD This section presents the assumptions and the design goals of SECRIN. Then, the system architecture is introduced. Fig. 1. oVirt Structure A. Threat Model and Assumption SECRIN aims to protect cryptographic keys against the attacks happening in VMs. The VM that invokes the SECRIN and oVirt [8]. By intensive experiments, we show that SE- services, might be completely compromised; i.e., attackers CRIN works compatibly with existing virtualization solutions, could exploit vulnerabilities [1]–[4], [11] to access sensitive provides secure cryptography services for various applications. data or even run privileged programs arbitrarily in the VM. II. BACKGROUND ON VIRTUALIZATION VMMs are assumed to be trustworthy. Isolation is enforced to prevent a VM from accessing the VMM’s memory data. We KVM-QEMU is a popular VMM solution, consisting of assume that it is free of VM escape (or privilege escalation) a Linux kernel module called KVM (kernel-based virtual vulnerabilities [12], [13]. This assumption can be ensured by machine) and a user-space program called QEMU. KVM the assistance of hardware virtualization features and reducing initializes CPU hardware and provides VM management inter- the size of trusted codes in VMMs [14], [15]. faces via the ioctl system call, such as mapping the memory SECRIN provides cryptography facilities, integrated with of a VM, and assigning virtual CPUs. QEMU invokes the the virtualization management. The virtualization management interfaces to run VMs, each of which is a user-space process. system is also assumed to be trustworthy. There is no operation VMMs emulate isolated peripheral devices for each VM. interface in the virtualization management for the operators to virtio [9] is a framework of device virtualization for KVM- disclose sensitive data of virtual cryptographic devices (i.e., QEMU. It presents an abstraction layer called virtqueue, i.e., the passwords and the keys in plaintext). First of all, SECRIN virtual queues connecting a front-end driver that runs in VMs works well, when the operators do not know the passwords or to the corresponding back-end driver in the user-mode QEMU. the keys. Note that, an operator of virtualization management Front-end and back-end drivers cooperate to emulate devices. is usually not the root of manager nodes or hosts, and a cloud A virtualization management system [7] coordinates lots of service does not grant unnecessary privileges to the operators. VMMs and VMs on the physical computation, network and The integrity of the platform is maintained by root users that storage resources of the platform. Generally, a virtualization have to be trusted, and unauthorized modification is prevented. platform consists of the following hardware: We assume that the operators cannot break the integrity of Manager Node. A manager node provides the operators and trusted binaries of the management system or VMMs. the tenants with portals for authentications and operations. It The threat model assumes the same conditions as most communicates with hosts to execute requested operations. public cloud services. Amazon S3 introduces three options Host. Each host runs a VMM to manage the VMs on it. A to encrypt data in clouds [16], [17]: a) in the client side platform may consist of hundreds,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us