secure outsourced computation in a multi-tenant cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf ·...

20
Secure Outsourced Computation in a Multi-Tenant Cloud Seny Kamara - Microsoft Research Mariana Raykova - Columbia

Upload: others

Post on 24-May-2020

20 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

Secure Outsourced Computation in a

Multi-Tenant Cloud Seny Kamara - Microsoft Research

Mariana Raykova - Columbia

Page 2: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

Outsourced Computation

(x, f )

f (x)

IBM WCSC 2

Page 3: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

The Cloud

IBM WCSC 3

Page 4: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

Virtualized Servers

Hardware

Hypervisor

OS

App1 App2

OS

App

OS

App

IBM WCSC 4

Page 5: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

Multi-Tenancy • Virtualization enables multi-tenancy

o VMs from different clients run on the same server

• Multi-tenancy allows cloud operator to o Optimize resources usage

• This all leads to $ saved for clients

Hardware

Hypervisor

OS

App1 App2

OS

App

OS

App

IBM WCSC 5

Page 6: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

Multi-Tenancy • Multi-tenancy is indispensible to cloud computing…

o This is where part of the economic incentives come from

• …but it introduces security concerns o What if a co-located VM attacks my VM?

• Current solution is VM isolation o VMs cannot see each other’s memory or state

o Resources are appropriately shared

Hardware

Hypervisor

OS

App1 App2

OS

App

IBM WCSC 6

Page 7: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

Breaking Isolation • Exploiting the hypervisor

o Some attacks known against VMware’s ESX, XBOX’s hypervisor, …

• Bypassing the hypervisor o [Ristenpart et al. 09] show that cross VM side-channels are possible

• Conclusion from [Ristenpart et al. 09]:

If security is a concern, use a single-tenant server.

IBM WCSC 7

Page 8: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

How do we Protect vs. Multi-Tenancy?

IBM WCSC 8

VM Isolation

vulnerabilities

side-channels

Hardware

Hypervisor

OS

App1 App2

OS

App

Single-Tenancy

Perfectly secure

Cryptography

strong security

Page 9: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

Outline • Motivation

o Secure outsourced computation in a multi-tenant cloud

• Delegation protocols o Security definition in ideal/real world paradigm

• General-purpose delegation protocol o Secret sharing & MPC

• Limitations of our approach

IBM WCSC 9

Page 10: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

A Possible Approach

EncK ( f (x) )

(EncK(x), f )

IBM WCSC 10

Fully-Homomorphic Encryption

[Gentry,…] (xʼ, f )

f (x), π

Verifiable computation

[Gentry-Gennaro-Parno,

Chung-Kalai-Vadhan]

Page 11: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

FHE + VC • Efficiency

o FHE is not practical

o VC is based on FHE

• Overkill o Interaction is OK

o Cloud is not a single-server environment

IBM WCSC 11

Page 12: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

Delegation Protocol • Protocol between

o C: the client who provides an input

o VM1,…,VMw: VM workers who have no input but return an output

X

IBM WCSC 12

Page 13: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

Underlying Assumption • Cross VM attacks always work

o Semi-honest: if A co-locates a VM then it recovers client VM’s state

o Malicious: if A co-locates a VM then it controls client VM

• Worst-case assumption o Makes our results stronger

o Captures concerns of highly sensitive clients (e.g., governments)

• Not essential to our model o probability of successful cross VM attack can be taken into account

IBM WCSC 13

Page 14: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

Security Definition • Ideal/real world paradigm from MPC […,Canetti01]

o Real execution: C and VMs run the real protocol in presence of A that

can co-locate adversarial VMs

o Ideal execution: C sends input to trusted party who returns f(x) in

presence of A that can co-locate adversarial VMs

o Security: “every A in the real world can be emulated by an A’ in the

ideal world”

o Note: If A is malicious then it is allowed to abort during the executions

• Guarantees: o As long as A co-locates at most (w - 1) adversarial VMs

o Privacy: A learns no information about C’s input or output

o Correctness: C receives correct output

IBM WCSC 14

Page 15: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

Multi-Party Computation

y x

z

f (x,y,z)

IBM WCSC 15

80’s: [Yao, Goldreich-Micali-

Wigderson,…]

Today: [Mohassel-Franklin, Lindell-

Pinkas, Kolesnikov-Sadeghi-

Schnedier,…]

Page 16: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

Secret Sharing

IBM WCSC 16

?

[Shamir]

Page 17: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

A General-Purpose Protocol • The approach

o Split input x into w shares (s1,…,sn)

o Store each share in a separate VM

o Make the VMs evaluate F using MPC

o F(s1,…,sn ; r1 ⊕… ⊕ rn): • recovers the input x from the shares

• Evaluates y = f(x)

• Use r1 ⊕… ⊕ rn to generate w shares of y

• Output a share of y to each VM

o VMs send back their shares to C who recovers y

IBM WCSC 17

Page 18: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

Intuition • Secret sharing

o A must corrupt each worker

• MPC o Enables VMs to securely compute on shared input

o Without revealing information about shares to other workers

• Prevents A from learning about 2+ shares with a single corruption

• “Coin Tossing” o Coins will be uniform as long as at least one worker is uncorrupted

o Guarantees sharing of output is secure

• Delegation is secure vs. malicious A if MPC is

IBM WCSC 18

Page 19: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

Limitations of Delegation Protocols • Efficiency

o Overhead for recover & share

o Overhead for MPC [+ ZKPs/C&C if A is malicious]

• Cost o Requires an extra (n – 1) VMs

• Useful o if cost of protocol < cost of single-tenant server

• Ongoing work o Efficient delegation protocols for specific functionalities (e.g., polynomials)

o Combining our approach with other techniques…

IBM WCSC 19

Page 20: Secure Outsourced Computation in a Multi-Tenant Cloudcs.brown.edu/~seny/slides/soc-wcsc.pdf · Multi-Tenancy • Multi-tenancy is indispensible to cloud computing… o This is where

Questions?

IBM WCSC 20