Award Abstract # 1330308
TWC: Frontier: Collaborative: Rethinking Security in the Era of Cloud Computing

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF WISCONSIN SYSTEM
Initial Amendment Date: August 14, 2013
Latest Amendment Date: June 28, 2017
Award Number: 1330308
Award Instrument: Continuing Grant
Program Manager: Ralph Wachter
rwachter@nsf.gov
 (703)292-8950
CNS
 Division Of Computer and Network Systems
CSE
 Direct For Computer & Info Scie & Enginr
Start Date: September 1, 2013
End Date: August 31, 2019 (Estimated)
Total Intended Award Amount: $1,995,068.00
Total Awarded Amount to Date: $1,995,068.00
Funds Obligated to Date: FY 2013 = $400,609.00
FY 2014 = $395,998.00

FY 2015 = $398,624.00

FY 2016 = $399,156.00

FY 2017 = $400,681.00
History of Investigator:
  • Michael Swift (Principal Investigator)
    swift@cs.wisc.edu
  • Aditya Akella (Co-Principal Investigator)
  • Thomas Ristenpart (Former Principal Investigator)
  • Michael Swift (Former Co-Principal Investigator)
Recipient Sponsored Research Office: University of Wisconsin-Madison
21 N PARK ST STE 6301
MADISON
WI  US  53715-1218
(608)262-3822
Sponsor Congressional District: 02
Primary Place of Performance: University of Wisconsin-Madison
WI  US  53706-1613
Primary Place of Performance
Congressional District:
02
Unique Entity Identifier (UEI): LCLSJAGTNZQ7
Parent UEI:
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01001314DB NSF RESEARCH & RELATED ACTIVIT
01001415DB NSF RESEARCH & RELATED ACTIVIT

01001516DB NSF RESEARCH & RELATED ACTIVIT

01001617DB NSF RESEARCH & RELATED ACTIVIT

01001718DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7434, 8087
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

There are at least two key features of the move to cloud computing that introduce the opportunity for significant leaps forward in computer security for tenant services. First, a compute cloud provides a common software, hardware and management basis for rolling out cross-cutting services en masse that have resisted incremental deployment in a one-service-at-a-time fashion. Second, compute clouds offer providers a broad view of activity across an unprecedented diversity of tenant services. This research project leverages these features to develop new approaches to a wide array of fundamental problems in computer security. By convening Cloud Security Horizons summits with industry stakeholders, this project further seeks to both contribute to industry directions in cloud computing and to be informed by them.

Particular longstanding security challenges addressed in this project include secure transport, authorization, user and software authentication, security monitoring, and incident analysis. Moreover, since modern clouds are not sufficiently extensible to support the envisioned capabilities, this project is constructing cloud software platforms that enable the flexibility, extensibility and security needed for this research to come to fruition in practice.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 25)
Aaron Gember-Jacobson, Raajay Viswanathan, Aditya Akella and Ratul Mahajan "Fast Control Plane Analysis Using an Abstract Representation" ACM SIGCOMM , 2016
Aaron Gember-Jacobson, Wenfei Wu, Xiujun Liu, Aditya Akella and Ratul Mahajan "Management Plane Analytics" IMC , 2015
Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, and Sam Scott "Key Rotation for Authenticated Encryption" Advances in Cryptology - Crypto 2017 , 2017
Anubhavnidhi Abhashkumar, Jeongkeun Lee, Jean Tourrilhes, Sujata Banerjee, Wenfei Wu, Joon-Myung Kang and Aditya Akella. "P5: Policy-driven optimization of P4 pipeline" SOSR '17 Proceedings of the Symposium on SDN Research , 2017 , p.136 10.1145/3050220.3050235
Kausik Subramanian, Loris D' Antoni and Aditya Akella. "Genesis: Data Plane Synthesis in Multi-Tenant Networks" POPL 2017 Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages , 2017 , p.572 10.1145/3093333.3009845
Keqiang He, Eric Rozner, Kanak Agarwal, Yu (Jason) Gu, Wes Felter, and John Carter and Aditya Akella. "AC/DC TCP: Virtual Switch-based Congestion Control Enforcement for Datacenter Networks" SIGCOMM '16 Proceedings of the 2016 ACM SIGCOMM Conference , 2016 , p.244 10.1145/2934872.2934903
Liang Wang, Paul Grubbs, Jiahui Lu, Vincent Bindschaedler, David Cash, and Thomas Ristenpart "Side-Channel Attacks on Shared Search Indexes" IEEE Symposium on Security and Privacy - Oakland 2017 , 2017
Paul Grubbs, Jiahui Lu, and Thomas Ristenpart "Message Franking via Committing Authenticated Encryption" Advances in Cryptology - Crypto 2017 , 2017
Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, and Thomas Ristenpart "Leakage-Abuse Attacks against Order-Revealing Encryption" IEEE Symposium on Security and Privacy - Oakland 2017 , 2017
Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, and Vitaly Shmatikov "Breaking Web Applications Built on Top of Encrypted Data" Computer and Communications Security - CCS 2016 , 2016
Paul Grubbs, Thomas Ristenpart, and Yuval Yarom "Modifying an Enciphering Scheme After Deployment" Advances in Cryptology - Eurocrypt 2017 , 2017
(Showing: 1 - 10 of 25)

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

Cloud computing refers to leveraging remote computing and data storageresources managed by a service provider (the "cloud operator") that istypically distinct from the customer leveraging those resources overthe Internet (the "cloud tenant").  Because clouds enable tenants topay for services based on use and so free tenants from building andmanaging their own datacenters, cloud computing has increasinglybecome a cornerstone of enterprise computing deployments over the pastdecade.


The premise of this project was that the shift to cloud computingoffers an opportunity to usher in a much-needed era of improvedinformation security.  Our research vision deviated from the prevalentcloud research agendas of the time, which focused on helping tenantsto both understand and then preempt new vulnerabilities that arise inmoving to a cloud that is oblivious to its tenants’ plights at bestand openly hostile to them at worst.  Instead we sought to exploit theopportunities inherent in leveraging cloud providers as trustedpartners to improve tenant security. In taking this perspective, weshowed that tenant security, like performance, cost, and scalability,can benefit from the key trends underlying the shift to cloudcomputing, such as the aggregation of services into cloud providersand the resultant economies of scale.


Concretely, we pursued research in three areas to support this vision,namely leveraging trust in cloud providers to help tenants managetheir client populations, their outsourced infrastructure, and theirdependencies on other tenants.  


- CLIENT POPULATIONS: A substantial fraction of the effort of runningan application service is consumed by addressing the risks posed byuntrusted clients.  These risks include client account takeovers,denial-of-service attacks, and exploit attempts on the server itself.We developed numerous technologies that leverage the cloud’s massiveresources, elastic scaling capabilities, and centralization to helptenant services defend against these risks.  For example, we developeda cloud-resident framework by which tenant sites can coordinate toensure that no end user is permitted to reuse the same or similarpasswords across these websites.  In doing so, this framework couldlargely break the culture of password reuse on the web today, which isthe dominant cause of account takeovers.  Moreover, this frameworkdoes not require disclosing a user's password at one website, or eventhe existence of her account at that website, to other sites.


- OUTSOURCED INFRASTRUCTURE: Numerous organizations outsource portionsof their own IT infrastructure to clouds, even if only to serveintra-organization purposes while achieving the cost savingsassociated with cloud computing.  We developed a number of mechanismsby which cloud operators could assist tenants in managing the securityof their outsourced infrastructure.  For example, we developed asystem called DynIRIS to leverage the cloud to detect subtle dataexfiltration from enterprises.  DynIRIS predicts attack pathways andthen instruments suspicious hosts with deep inspection (e.g., trackingreads from sensitive files into memory) as needed to detect dataexfiltration.  To mitigate performance impact of deep instrumentation,DynIRIS leverages other infrastructure developed within the project todynamically migrate hosts on which deep instrumentation is required tomore powerful servers.


- DEPENDENCIES ON OTHER TENANTS: We showed that new cloud services canhelp to mediate secure interactions among tenants, and further enabletenants to offer secure foundational services and application servicesto one another, even without a priori trust between them.  Forexample, we designed a fully extensible, general layered attestationarchitecture called Latte for the multi-tenant cloud.  Clients canverify that cloud services deployed in Latte are running code builtfrom specified source repositories. We implemented Latte in Kubernetes, Docker and Spark to demonstrate how Latte can be used to improve crosstenant trust with attestation, such as to allow restricted use ofprivate data.


In addition to the technologies outlined above, the project ran a Cloud Security Horizons Summit in years 1, 3, and 5.  This summitbrought the research team together with industry stakeholders,specifically representatives from among cloud operators, software andhardware companies providing cloud-computing infrastructure, and majorcloud tenants.  The meetings exposed these stakeholders to theproject's research outcomes, gathered feedback from these stakeholderson the team's future research plans, and informed the research team ofongoing security challenges faced by cloud operators and tenants.


Another component of this project was a curriculum developmentworkshop that the researchers organized in years 2-5.  Each workshophosted instructors from approximately a dozen non-R1 post-secondaryinstitutions in the US at UNC-Chapel Hill for 2.5 days.  The purposeof the workshop was to help these instructors incorporate coverage ofcloud security topics in their existing course offerings, and includedcreation of lecture materials, presentations on cloud testbeds forconducting course projects, discussion of course project ideas, and anorganized tour of a cloud-computing facility at IBM or NetApp.


Last Modified: 01/06/2020
Modified by: Michael M Swift

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page