Privacy-Sensitive VM Retrospection

نویسندگان

  • Wolfgang Richter
  • Glenn Ammons
  • Jan Harkes
  • Adam Goode
  • Nilton Bila
  • Eyal de Lara
  • Vasanth Bala
  • Mahadev Satyanarayanan
چکیده

The success of cloud computing leads to large, centralized collections of virtual machine (VM) images. The ability to retrospect (examine the historical state of) these images at a high semantic level can be valuable in many aspects of IT management such as debugging and troubleshooting, software quality control, legal establishment of data or code provenance, and cyber forensics such as malware tracking and licensing violations. In this paper, we explore the privacy implications of VM retrospection. We argue that retrospection will worsen current concerns about privacy in cloud computing. We develop privacysensitive requirements for the design of a retrospection mechanism, and then show how they can be met in a functional prototype. 1 Executable Content as Searchable Data We normally think of VM images as executable content, but the practice of archiving VM snapshots in cloud computing suggests that it may also be valuable to view them as “big data.” Snapshots of a VM image over time represent historical provenance that can be relevant to debugging, troubleshooting, and forensics. We use the term VM retrospection for this ability to pose and answer deep questions about VM images. In contrast to VM introspection [5], which examines active VM state during execution, retrospection focuses on passive VM state. For example, consider a developer who periodically snapshots his VM. When a colleague encounters a misconfiguration bug that has plagued the developer in the past, he is able to search through the VM history to reproduce the bug and to recapitulate its fix. A different example involves a graphic arts company that is accused of copyright infringement. By searching archived VM history of the company’s employees, the plaintiff is able to show how they transformed the original photograph into the disputed product. Other use cases of VM retrospection can be found in a recent position paper [11]. This paper focuses on the privacy implications of VM retrospection. We argue that retrospection will worsen current concerns about privacy in cloud computing. We develop privacy-sensitive requirements for the design of a retrospection mechanism, and then show how they can be met in a functional prototype. 2 Honoring the Principle of Least Privilege A dominant concern of retrospection is the need to be extremely sensitive to issues of privacy. There is already enormous public concern about the potential for compromise of personal privacy in cloud computing. The concentration of VM images in a cloud, rather than the dispersal of that state over myriad personal computers (many inaccessible behind firewalls), simplifies the task of exploring that state for good or evil. Just a small sampling of the huge volume of recent discourse on this topic [2, 3, 7] shows the level of public concern. Microsoft recently requested the United States Congress to pass legislation on privacy in cloud computing [12]. In this highly charged atmosphere, creating a VM retrospection capability is sure to cause alarm. It is therefore essential that the high-level architecture and method of operation of the mechanism be clearly and unambiguously biased in favor of privacy. The deep concerns about privacy suggest that a good retrospection mechanism is unlikely to be obtained through the most obvious implementation strategy. That strategy would be to leverage the well-understood world of Web search exemplified by Google and Bing, and to use search engine software such as MapReduce to periodically crawl VM images in a cloud and index their content. Such an approach would inflame privacy advocates because of the power that it would give to cloud owners and their search partners. There would be fear of abuse of this power. There would be serious concerns about unauthorized searches by cloud employees on already-built indexes. There would also be great concern over frequent exposure of data for index creation. These issues have not surfaced in the context of Web search because the data in question is, by definition, “published” by their owners. In contrast, VM images in a cloud are not “published” by their owners—they are given for safe-keeping to the cloud operator, much as one places valuables for safe-keeping in a bank’s vault. Since perception matters as much as reality in matters of trust, these privacy-related concerns will be difficult to overcome. A good retrospection mechanism should be finegrained and selective in its application. It should involve more heavyweight actions than an index lookup, and there should be an opportunity to inspect and/or audit the computations involved in a search. The mechanism should not require any component (such as a search engine for index creation) to have cloud-wide access to the complete con-

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Privacy-aware Virtual Machine Migration Framework on Hybrid Clouds

With the proliferation of hybrid clouds in both cost-saving and effectiveness, a growing number of users are building their own private cloud. However, private cloud can only provide limited resource, and always resorts to public cloud in order to meet elastic service requirements. Generally, public cloud is operated by commercial service providers (CSPs) who are not completely honest with user...

متن کامل

Protecting patients’ electronic health records using enhanced active bundles

We propose a solution that provides protection for patients' electronic health/medical records disseminated among different authorized healthcare information systems. The solution is known as Active Bundles using a Trusted Third Party (ABTTP). It is based on the use of trusted third parties, and the construct named active bundles. The latter keep electronic health/medical records as sensitive d...

متن کامل

SAFETY: A Framework for Secure IaaS Clouds

Vivek Shrivastava International Institute of Professional Studies, Devi Ahilya University, Indore-17 Email: [email protected] D. S. Bhilare Computer Centre, Devi Ahilya University, Indore-17 Email: [email protected] ----------------------------------------------------------------------ABSTRACT----------------------------------------------------------Cloud Computing is benefiting to ...

متن کامل

ABTTP: A TTP-based Prototype for Protecting Confidentiality of Sensitive Data with Active Bundles

The main challenges in information sharing are limitations of mechanisms for protecting confidentiality of sensitive data. An owner of the data may not be able to enumerate all entities that are allowed to access his data. The common approach to solve this problem is to attach privacy policies to the data. This approach assumes that the recipient’s hosts enforce the policies attached to the dat...

متن کامل

Spoken Control of Existing Mobile Interfaces With the Crowd

Figure 1: Legion:Mobile is a a conversational assistant that is able to control a user’s mobile device when asked to. Using a virtual machine (VM) hosted in the cloud, along with a remote desktop application to provide access, workers can jointly control the device based on verbal requests made by the user. To protect privacy, the user can pause or terminate the session at will to avoid requiri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011