Welcome!

Open Source Cloud Authors: Liz McMillan, Vaibhaw Pandey, Stackify Blog, Rostyslav Demush, Pat Romanski

Related Topics: @CloudExpo, Microsoft Cloud, Open Source Cloud, Containers Expo Blog, Cloud Security

@CloudExpo: Article

Leveraging Hardware to Protect the Cloud

Implementing cloud security

Today, security is undoubtedly the biggest risk and negative side effect to cloud computing. Fortunately, the status quo is about to change. The Trusted Computing Group (TCG), a not-for-profit organization that has developed open standards for computers, networks, storage and mobile devices to improve enterprise and personal security, is now focusing its attention on cloud computing security. The hardware basis of trust for many aspects of TCG's standards is the Trusted Platform Module, or TPM. For a virtualized trusted platform, a virtual TPM (vTPM) and all the associated architecture have been defined to provide protection for virtual machines paralleling the hardware-rooted security offered on non-virtualized platforms. While the standard was only recently released, it represents the culmination of a decade-long effort by TCG members to increase financial, medical, government and other organizations' trust in electronic information processing, communication and control.

Virtualizing Trust
Establishing trust in computers, servers, networks, storage and mobile devices owned and controlled by a company is an ongoing and complex effort for any enterprise. For over ten years, experts from leading companies in a variety of technology areas have shared their expertise in several work groups within the Trusted Computing Group, developing open industry specifications to provide trust in all of these areas. For example, providing secure access to corporate networks, computers and servers from devices outside of the company's control such as employee's personal smartphones and partner's/clients computers, while blocking unauthorized access has been addressed in TCG network standards, such as the Trusted Network Connect and IF-MAP metadata access protocol interface. However, the extent and complexity of cloud-based resource sharing requires even greater attention.

To address the security and trust issues associated with cloud computing, TCG established the Virtualized Platform Working Group (VPWG). The VPWG's efforts to define the interfaces and services necessary to virtualize the trusted platform capabilities on a particular system have resulted in the Virtualized Trusted Platform Architecture Specification (Specification Version 1.0 Revision 0.26, September 27, 2011). Building on its existing standards, including the Trusted Platform Module that currently provides a hardware root of trust in over half a billion enterprise grade computers and servers, TCG has extended trust to the virtual space of cloud computing. Hardware-based trust implemented through a TPM is more secure than software-only based trust because software is vulnerable to the same attacks that it attempts to prevent.

TCG's new architecture allows cloud-based systems to create virtualized instances of the TPM. This means that a single system can run multiple guests or virtual machines (VMs) and each machine acts as if it has its own physical TPM (pTPM). In reality, it is a virtual TPM. The vTPM is accomplished in software and is probably running a hardware-protected layer below the VM. From the VM's perspective, it appears to have a physical system. However, a single virtualized platform can have multiple VMs each using its own distinct virtual TPM. Figure 1 shows the architectural shift that must occur to establish trust in a virtualized world. Some of the new terminology shown in the figure and used to discuss the architecture is summarized in Table 1.

Terminology

Term

Description

Core Root of Trust for Measurement (CRTM)

RTM that is specifically responsible for measuring the initial code executed on a platform

Deep Attestation

Attesting both VM and VMM

Migration

Movement of VMs between systems

Migration Controller

Manages VM migrations

Physical RTM (pRTM)

RTM that specifically refers to a physical, hardware-based root of trust for measurement

Remote Challenger

Requests attestation evidence

Root of Trust for Measurement (RTM)

Hardware, firmware and/or software responsible for measuring software

vCRTM (or vRTM)

Virtual CRTM measuring initial VM code into vTPM

VM

Virtual Machine

VMM

Virtual Machine Manager (AKA hypervisor)

vPlatform

Virtualized Trusted Platform

vTPM

Virtual TPM functionality assigned to a particular VM

Table 1: Terminology used to develop a trusted virtualized platform capable of running cloud services

Figure 1: Transitioning from a non-virtualized to a virtualized platform

Layer 1 of the architecture consists of the physical platform components. Layer N is the top layer in the virtualization general architecture where multiple virtual machines operate independently. In between Layer 1 and Layer N are one or more layers in the architecture offering a virtualized platform to virtual machines running in Layer N.

To restrict or bound the scope of the effort, the software is assumed to run unmodified in a VM - there is no expectation of special virtualization-aware (paravirtualization) software in the VM in order to make the architecture work. In addition, the architecture allows a variety of different virtualization models including the absence of some features such as PC Client virtualization without migration support or addition of other features such as hop swap blade servers supporting migration. Other requirements include vTPM instance backup/restore, deep attestation of layers below the VM and the ability to migrate vPlatform (including the vTPM) along with the VM to another system.

While there are numerous issues and challenges to be addressed in establishing a trusted virtual architecture, some of the most critical are:

  • Protecting the vPlatform state while in memory or on storage and ensuring this state across reboots or crashes
  • Supporting different vPlatform versions per VM on the same system
  • Maintaining vPlatform integrity with field upgrades and in backup/restore
  • Preventing malicious duplication during vPlatform migration

In addition, for attestations the architecture must provide Remote Challenger detection of virtualization and deep attestations of VMs and the underlying VMM (defined in the scope but nevertheless challenging) as well as finding/ensuring the VM and VMM are on the same platform. The new architecture has addressed all of these aspects.

Architectural Model
The VPWG's intent for the Virtual Platform Architectural specification is usage in both PC client and low-end (e.g., X86) server virtualization as well as high-end server virtualization. Figure 2 shows a possible architecture based on the specification. The boxes within each layer are components that perform defined roles in the architecture. Components can be part of existing features and don't have to be standalone software modules. The interaction of components that occurs using application program interfaces (APIs) or protocols could be a topic for future standards.

Figure 2: A three-layer architecture possibility using a Privileged VM (VM #1) that can manage the other VMs

The architecture allows for improved administrator tools to back up the contents of the vTPM and restore it later. This can't be accomplished with the physical TPM. There are specific advantages for data centers as well.

One of the advantages occurs when the data center's management wants to roll out new versions of software as a pilot or in a test environment before going into production. With a virtualized system, the production system can be running in one VM and the test system running in another VM on the same physical system. This architecture allows the test system to use the latest version of the TPM.

Creating a Virtual Trusted Platform
Several situations could result in a new VM being instantiated including local configuration change, a VM being migrated to the system, or even system demand has gone up so another local VM instance is required. Since the VMM is the vPlatform "manufacturer," it is responsible for constructing the vTPM and vCRTM on-the-fly. This may be as simple as adding a state to a vPlatform table. Next, the VMM instantiates the vPlatform state with the created instance for use only by an associated VM. The instantiated vCRTM and vTPM are dedicated to the new VM and appear as their physical equivalents (so the VM doesn't know it's virtualized). They allow an unmodified VM to execute without recognizing that the TPM and CTRM are not physical components.

Operational Example
Attestation becomes much more complicated and more interesting when a virtualized platform is involved. In a non-virtualized system, attestation simply involves the trusted computing portions of the operating system providing evidence about the current operational state of the physical system to a remote party (Remote Challenger). The Remote Challenger decides the level of trust for the platform before allowing access to its resources.

When attesting a virtualized system, the VM performs all the same attestation-oriented tasks it would do if it was actually running on hardware. First, the Remote Challenger uses the attestation protocol and discovers that it is communicating with a VM. Since the VM is not directly running on hardware, the VM can be compromised by the VMM layer below it. If a malware controlled VMM was running below the VM, it would be possible to compromise the VM in a way that Remote Challenger could not detect by only obtaining an attestation of the VM.

The remote party has to determine how to attest the layer below the VM and decide whether it's trustworthy. Because of the nesting architecture that the specification supports, there may be additional software layers below the first VMM, so attestation chains down the different layers until it's convinced that the system is trustworthy. The credentials (X.509 certificates) associated with each layer indicate when the layer is running in a virtualized environment and how to contact the layer below to obtain more attestation evidence. This model allows for the arbitrary nesting of virtualization layers since the Remote Challenger can obtain an attestation about the VM and then attest each layer below until reaching the bottom using the credential information.

Now that we have discussed how to attest a virtualized platform, let's discuss another complexity - VM migration.

Figure 3 shows how the new architecture can perform remote attestation of a VM that can be migrated while the Remote Challenger is using it. For remote attestation, the Remote Challenger obtains VM attestation evidence and certificates from an Attestation agent in the VM (shown as Guest OS in the yellow box) just like it would if the system wasn't virtualized. During this process the Remote Challenger learns that the platform is virtualized. The integrity validator in the Remote Challenger then compares the obtained attestation data against the integrity policy and decides whether it's trustworthy. Similarly, the Remote Challenger also obtains VMM integrity evidence and certificates from the Deep Attestation Service of a Privileged VM (capable of returning information about the VMM shown as a green box) and verifies that evidence as well.

Figure 3: Accomplishing remote attestation, migration and migration notification with the Virtualized Trusted Platform Architecture

VM migration is supported by the attestation architecture. For example, a data center with several virtualized platforms and a VM instance running on one physical machine might require migration when that platform needs to be rebooted to install patches. Maintaining availability of the VMs' services requires moving the VMs that were running on the rebooting machine to another so that customers who are accessing those VMs are not even aware of the transition.

After a Remote Challenger has performed, an attestation of a VM and VMM as described above (and shown in steps 1-4), its policy may require attestation evidence about the Migration System and more detail about when the VM might be migrated. If the VM could be migrated at any time, some Remote Challengers may opt to register for a Migration Notification (shown as Step 10). This enables the Remote Challenger to use the VM and if a migration event occurs, the Remote Challenger can obtain attestation evidence about the new VMM and platform hosting the VM. This architecture allows the VM to be moved at any time and optionally allow Remote Challengers to re-assess their trust decisions.

Implementing Cloud Security
In the past, TCG did not specify how to virtualize the physical trusted hardware present in systems offering cloud-based services. Since many cloud-based offerings are implemented on top of a group of virtualized servers, this made it challenging to protect the offerings with a TPM. With this 2011 open standard, the Virtualized Trusted Platform Architecture, that situation has changed dramatically. As a result, vendors are encouraged to develop products that are consistent with this architecture to make it easy for customers and cloud providers to use the TCG-based security of the TPM. This new specification also leverages the widely deployed TCG Trusted Network Connect architecture as the basis for performing the attestations. For example, the TNC protocol stack could run within each of the VMs enabling TPM-based assessments of the VM.

More Stories By Paul Sangster

Paul Sangster, Symantec Distinguished Engineer, participates in several Trusted Computing Group work groups and has chaired several. For more information on the virtualized platform specifications and other open standards, please see http://www.trustedcomputinggroup.org/developers/virtualized_platform.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicate or sell. In their Day 3 Keynote at 21st Cloud Expo, Greg Chambers, Global Group Director, Digital Innovation, Coca-Cola, and Vidya Nagarajan, a Senior Product Manager at Google, discussed how from store operations and ...
In his session at 21st Cloud Expo, Carl J. Levine, Senior Technical Evangelist for NS1, will objectively discuss how DNS is used to solve Digital Transformation challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases. Carl J. Levine is the Senior Technical Evangelist for NS1. A veteran of the Internet Infrastructure space, he has over a decade of experience with startups, networking protocols and Internet infrastructure, combined with the unique ability to it...
"There's plenty of bandwidth out there but it's never in the right place. So what Cedexis does is uses data to work out the best pathways to get data from the origin to the person who wants to get it," explained Simon Jones, Evangelist and Head of Marketing at Cedexis, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
SYS-CON Events announced today that Telecom Reseller has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
WebRTC is great technology to build your own communication tools. It will be even more exciting experience it with advanced devices, such as a 360 Camera, 360 microphone, and a depth sensor camera. In his session at @ThingsExpo, Masashi Ganeko, a manager at INFOCOM Corporation, introduced two experimental projects from his team and what they learned from them. "Shotoku Tamago" uses the robot audition software HARK to track speakers in 360 video of a remote party. "Virtual Teleport" uses a multip...
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
"Space Monkey by Vivent Smart Home is a product that is a distributed cloud-based edge storage network. Vivent Smart Home, our parent company, is a smart home provider that places a lot of hard drives across homes in North America," explained JT Olds, Director of Engineering, and Brandon Crowfeather, Product Manager, at Vivint Smart Home, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
It is of utmost importance for the future success of WebRTC to ensure that interoperability is operational between web browsers and any WebRTC-compliant client. To be guaranteed as operational and effective, interoperability must be tested extensively by establishing WebRTC data and media connections between different web browsers running on different devices and operating systems. In his session at WebRTC Summit at @ThingsExpo, Dr. Alex Gouaillard, CEO and Founder of CoSMo Software, presented ...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
SYS-CON Events announced today that Evatronix will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Evatronix SA offers comprehensive solutions in the design and implementation of electronic systems, in CAD / CAM deployment, and also is a designer and manufacturer of advanced 3D scanners for professional applications.
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. In his session at @BigDataExpo, Jack Norris, Senior Vice President, Data and Applications at MapR Technologies, reviewed best practices to ...
An increasing number of companies are creating products that combine data with analytical capabilities. Running interactive queries on Big Data requires complex architectures to store and query data effectively, typically involving data streams, an choosing efficient file format/database and multiple independent systems that are tied together through custom-engineered pipelines. In his session at @BigDataExpo at @ThingsExpo, Tomer Levi, a senior software engineer at Intel’s Advanced Analytics gr...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things’). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing? IoT is not about the devices, it’s about the data consumed and generated. The devices are tools, mechanisms, conduits. In his session at Internet of Things at Cloud Expo | DXWor...
Everything run by electricity will eventually be connected to the Internet. Get ahead of the Internet of Things revolution. In his session at @ThingsExpo, Akvelon expert and IoT industry leader Sergey Grebnov provided an educational dive into the world of managing your home, workplace and all the devices they contain with the power of machine-based AI and intelligent Bot services for a completely streamlined experience.
SYS-CON Events announced today that Synametrics Technologies will exhibit at SYS-CON's 22nd International Cloud Expo®, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Synametrics Technologies is a privately held company based in Plainsboro, New Jersey that has been providing solutions for the developer community since 1997. Based on the success of its initial product offerings such as WinSQL, Xeams, SynaMan and Syncrify, Synametrics continues to create and hone inn...