SlideShare une entreprise Scribd logo
1  sur  47
Télécharger pour lire hors ligne
Arun Olappamanna Vasudevan
Stony Brook University
http://www.fsl.cs.sunysb.edu/
Finding the Right Balance:
Security vs. Performance
with Network Storage Systems	
  
A	
  Master’s	
  Thesis	
  
Summary of Contributions
l  Co-developed a secure NFSv4 proxy
with integrity-checking, encryption, anti-
virus, and cache
l  Contributed to NFS-Ganesha project to
support stacking of multiple FSALs
l  Developed buffer scanner in ClamAV
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 2
LOC Proxy-cache,
Anti-virus
Integrity-
Encryption
Total
Source 9,264 3,586 12,850
l  Motivation
l  Background
l  Design
l  Implementation
l  Evaluation
l  Conclusions and Future Work
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 3
Outline
Cloud Storage
l  Availability
u Google Cloud Platform @ 99.9973% up-
time
l  Scalability
l  Economical
l  Accessibility
l  Easy to share and collaborate
documents
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 4
Security Concerns
l  Confidentiality
u Sony Pictures Entertainment
u Photos of celebrities in iCloud hack
l  Integrity
u CERN – petabyte scale data
u 22/33,700 files corrupted (8.7 TB)
l  Availability
u Symantec report – 43% of respondents
have lost data in cloud!
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 5
Threat Model
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 6
Cloud
Secure
Proxy
Clients
LAN
WAN
Trusted Untrusted
Semi-trusted
HTTPI
Server
Authentication
Message
Integrity
Message
Confidentiality
HTTP ✖ ✖ ✖
HTTPS ✔ ✔ ✔
HTTPI ✔ ✔ ✖
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 7
b
l  Motivation
l  Background
l  Design
l  Evaluation
l  Implementation
l  Conclusions and Future Work
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 8
Outline
NFSv4 and Cloud
l  Cloud storage gateways
l  Amazon Elastic File System (EFS)
l  Cloud NAS
u Zadara Storage
u SoftNAS
l  NFSv4
u Compounds
u Delegation
u pNFS
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 9
Example: IBM Panache
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 10
Client
Client
Client
Client
Panache
cluster
GPFS
pNFS
WAN
l  Motivation
l  Background
l  Design
l  Implementation
l  Evaluation
l  Conclusions and Future Work
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 11
Outline
Design Goals
l  Advanced security features
u Encryption, integrity-check, anti-virus
u Security policies
l  Minimal performance penalty
u Cache
l  Easy to develop and maintain
u Proxy architecture
u Layered implementation
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 12
Proxy Architecture
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 13
Server
Proxy with
security and cache
Clients
LAN
WAN
NFS
NFS
NFS-Ganesha
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 14
Client
Proxy NFSv4
Cache_inode
Server
Stackable
FSAL
FSAL_
PROXY
open read write
pxy_open pxy_read pxy_write
File
System
Abstraction
Layers
(FSAL)
Layered Architecture
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 15
Client
Proxy
Server
Security
Cache
Client
Proxy
Server
Cache
Security
Model A Model B
Model A
Item Support?
Write-back cache ✔
Protect against bad data in cache
from server
✖
Protect against bad data in cache
from client
✔
Additional data for security ✔
Modification of data ✖
Handling security updates ✔
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 16
Client
Proxy
Server
Security
Cache
Model A (Write Path)
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 17
Model B
Item Support?
Write-back cache ✖
Protect against bad data in cache
from server
✔
Protect against bad data in cache
from client
✖
Additional data for security ✖
Modification of data ✔
Handling security updates ✖
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 18
Client
Proxy
Server
Cache
Security
Final Hybrid Design
l  Cache – Read and write
in block units
l  Anti-virus protects
against malware from
clients
l  Crypto and integrity
protect confidentiality
and integrity of data in
server
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 19
Client
Proxy
Server
Anti-virus
Cache
Crypto
Integrity
l  Motivation
l  Background
l  Design
l  Implementation
l  Evaluation
l  Conclusions and Future Work
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 20
Outline
Anti-Virus
l  ClamAV
u Signature-based anti-virus scanner
u Full-file scans
l  Server-data is protected by integrity
u Scan only writes from clients
u Every 5 minutes (configurable) and at close
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 21
Cache
l  Write-back data cache
u Every 5 minutes (configurable) and at close
u Meta-data is not cached
l  Persistent cache
u Sparse local files for cached remote files
u Page-cache in memory
l  Thread-safe implementation
u Per-file range locks
u Handling asynchronous write-backs
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 22
Integrity
l  SCSI standard Data Integrity Field (DIF)
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 23
Integrity with NFSv4.2
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 24
APP
OS
NFS Client
NFS Server
OS
HBA
Device
WAN
DIX
DIF
WRITE_PLUS(data, integrity_tag)
READ_PLUS: data, integrity_tag
WRITE(data)
WRITE(data)
READ: data
READ: data
DIX: Data Integrity eXtension
Integrity and Encryption
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 25
PDATA
ADATA
Cipher-text
Integrity_tag
AES-GCM
Plain-text
data
Authentication
data
File key
l  Motivation
l  Background
l  Design
l  Implementation
l  Evaluation
l  Conclusions and Future Work
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 26
Outline
Experimental Setup
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 27
Virtual SCSI
device with
DIX support
Proxy
Anti-virus
Cache
Crypto
Integrity
Client 1
Client 3
Client 2
Client 4
Client 5
Server
LAN (0.2ms RTT)
10 GbE
WAN (30ms RTT)
1 GbE
Experiments
l  Micro-workloads
u 100 files pre-allocated
u Repeat for 2 minutes:
§ Open a random file
§ Read n times
§ Write m times
§ Close file
l  Macro-workloads (Filebench)
u File server and Mail server
u Web server
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 28
Combinations of Features
Configs Proxy Integrity Encryption Caching Anti-virus
P (baseline) ✔ ✖ ✖ ✖ ✖
I ✔ ✔ ✖ ✖ ✖
IE ✔ ✔ ✔ ✖ ✖
IC ✔ ✔ ✖ ✔ ✖
ICE ✔ ✔ ✔ ✔ ✖
ICEA ✔ ✔ ✔ ✔ ✔
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 29
1:1 Read-Write ratio 1 MB
0
20
40
60
80
100
120
140
160
P I IC IE ICE ICEA
#Ops/Sec
Security and Caching Configs
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 30
2.2X 2.3X
1:1 Read-Write ratio 10 MB
0
20
40
60
80
100
120
140
160
180
P I IC IE ICE ICEA
#Ops/Sec
Security and Caching Configs
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 31
-21%
2.9X
2.4X
-23%
Speed-up vs. Read-Write ratio
0
1
2
3
4
5
6
7
8
9
10
1 2 4 8 16
SpeedupFactorRelativetoBaseline
Read-to-Write Ratio
I
IC
ICE
ICEA
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 32
1:16 Read-Write ratio 1 MB
0
5
10
15
20
25
30
35
40
45
50
P I IC IE ICE ICEA
#Ops/Sec
Security and Caching Configs
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 33
+5%
File Server Workload
0
5
10
15
20
25
30
35
40
45
P I IC IE ICE ICEA
#Ops/Sec
Security and Caching Configs
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 34
-25%
Web Server Workload
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 35
0
20
40
60
80
100
120
140
160
180
200
P I IC IE ICE ICEA
#Ops/Sec
Security and Caching Configs
-60%
+77% +75%
Evaluation Summary
l  Integrity
u Overhead: 3–26%
l  Encryption with integrity
u No additional overhead
l  Anti-virus
u Overhead: up to 23% for 10MB files
l  Cache
u Performance: up to 8x
l  File server, Mail server, Web server
u With all features: 23–28% overhead
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 36
l  Motivation
l  Background
l  Design
l  Implementation
l  Evaluation
l  Conclusions and Future Work
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 37
Outline
Conclusions
l  Designed and implemented a secure
NFS proxy with cloud back-end
l  Overhead of security
u Integrity and Encryption give similar
overheads
u Anti-virus overhead depends on file-size
l  Caching can offset security overhead to
a great extent
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 38
Future Work
l  Security
u Use Merkle tree or versioning scheme for integrity
u Meta-data confidentiality
l  Performance
u Anti-virus scanning incrementally
u Relax NFS strict consistency
§  Use RESTful protocols between proxy and server
l  Kurma – Secure Geo-Replicated Multi-Cloud
Storage Gateways
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 39
Acknowledgements
l  My advisor, Dr. Erez Zadok
l  Ming Chen, Kelong Wang
l  My family and friends
l  Committee members
l  NSF
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 40
Arun Olappamanna Vasudevan
Stony Brook University
http://www.fsl.cs.sunysb.edu/
Finding the Right Balance: Security vs. Performance
with Network Storage Systems	
  
A	
  Master’s	
  Thesis	
  
Q&A	
  
Kurma: Secure Geo-Replicated Multi-Cloud
Storage Gateways
Region
1
Clients
Region
2
metadata
metadata
metadata
Region
3
Azure
S3
Drive
Untrusted
Secure
Gateway
Public Clouds
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 42
Model A (Read Path)
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 43
Model B (Read Path)
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 44
Model B (Write Path)
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 45
Final Hybrid Design
(Read Path)
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 46
Final Hybrid Design
(Write Path)
05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 47

Contenu connexe

Tendances

Automating AWS Security with Serverless Technology
Automating AWSSecurity withServerless TechnologyAutomating AWSSecurity withServerless Technology
Automating AWS Security with Serverless TechnologyLuc van Donkersgoed
 
Webinar slides: How to deploy and manage HAProxy, MaxScale or ProxySQL with C...
Webinar slides: How to deploy and manage HAProxy, MaxScale or ProxySQL with C...Webinar slides: How to deploy and manage HAProxy, MaxScale or ProxySQL with C...
Webinar slides: How to deploy and manage HAProxy, MaxScale or ProxySQL with C...Severalnines
 
Austin CSS Slalom Presentation
Austin CSS Slalom PresentationAustin CSS Slalom Presentation
Austin CSS Slalom PresentationAlert Logic
 
Web servers presentacion
Web servers presentacionWeb servers presentacion
Web servers presentacionKiwi Science
 
OpenStack Tutorial For Beginners | OpenStack Tutorial | OpenStack Training | ...
OpenStack Tutorial For Beginners | OpenStack Tutorial | OpenStack Training | ...OpenStack Tutorial For Beginners | OpenStack Tutorial | OpenStack Training | ...
OpenStack Tutorial For Beginners | OpenStack Tutorial | OpenStack Training | ...Edureka!
 
Open Stack Cheng Du Swift Alex Yang
Open Stack Cheng Du Swift Alex YangOpen Stack Cheng Du Swift Alex Yang
Open Stack Cheng Du Swift Alex YangOpenCity Community
 
Satellite3 workshop nep2009
Satellite3 workshop nep2009Satellite3 workshop nep2009
Satellite3 workshop nep2009Salih Odabasi
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedJason Chan
 

Tendances (8)

Automating AWS Security with Serverless Technology
Automating AWSSecurity withServerless TechnologyAutomating AWSSecurity withServerless Technology
Automating AWS Security with Serverless Technology
 
Webinar slides: How to deploy and manage HAProxy, MaxScale or ProxySQL with C...
Webinar slides: How to deploy and manage HAProxy, MaxScale or ProxySQL with C...Webinar slides: How to deploy and manage HAProxy, MaxScale or ProxySQL with C...
Webinar slides: How to deploy and manage HAProxy, MaxScale or ProxySQL with C...
 
Austin CSS Slalom Presentation
Austin CSS Slalom PresentationAustin CSS Slalom Presentation
Austin CSS Slalom Presentation
 
Web servers presentacion
Web servers presentacionWeb servers presentacion
Web servers presentacion
 
OpenStack Tutorial For Beginners | OpenStack Tutorial | OpenStack Training | ...
OpenStack Tutorial For Beginners | OpenStack Tutorial | OpenStack Training | ...OpenStack Tutorial For Beginners | OpenStack Tutorial | OpenStack Training | ...
OpenStack Tutorial For Beginners | OpenStack Tutorial | OpenStack Training | ...
 
Open Stack Cheng Du Swift Alex Yang
Open Stack Cheng Du Swift Alex YangOpen Stack Cheng Du Swift Alex Yang
Open Stack Cheng Du Swift Alex Yang
 
Satellite3 workshop nep2009
Satellite3 workshop nep2009Satellite3 workshop nep2009
Satellite3 workshop nep2009
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons Learned
 

En vedette

Gluster overview & future directions vault 2015
Gluster overview & future directions vault 2015Gluster overview & future directions vault 2015
Gluster overview & future directions vault 2015Vijay Bellur
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud
 
B 8スポンサー講演資料 osnexus steven umbehocker (アファーム・ビジネスパートナーズ株)
B 8スポンサー講演資料 osnexus steven umbehocker (アファーム・ビジネスパートナーズ株)B 8スポンサー講演資料 osnexus steven umbehocker (アファーム・ビジネスパートナーズ株)
B 8スポンサー講演資料 osnexus steven umbehocker (アファーム・ビジネスパートナーズ株)softlayerjp
 
Cephのベンチマークをしました
CephのベンチマークをしましたCephのベンチマークをしました
CephのベンチマークをしましたOSSラボ株式会社
 
Introduction to highly_availablenfs_server_on_scale-out_storage_systems_based...
Introduction to highly_availablenfs_server_on_scale-out_storage_systems_based...Introduction to highly_availablenfs_server_on_scale-out_storage_systems_based...
Introduction to highly_availablenfs_server_on_scale-out_storage_systems_based...Gluster.org
 
BSides London - Scapy Workshop
BSides London - Scapy WorkshopBSides London - Scapy Workshop
BSides London - Scapy WorkshopAdam Maxwell
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Lisa 2015-gluster fs-introduction
Lisa 2015-gluster fs-introductionLisa 2015-gluster fs-introduction
Lisa 2015-gluster fs-introductionGluster.org
 
GlusterFs Architecture & Roadmap - LinuxCon EU 2013
GlusterFs Architecture & Roadmap - LinuxCon EU 2013GlusterFs Architecture & Roadmap - LinuxCon EU 2013
GlusterFs Architecture & Roadmap - LinuxCon EU 2013Gluster.org
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
 
Cloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop SampleCloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop SampleAlan Quayle
 
The State of Ceph, Manila, and Containers in OpenStack
The State of Ceph, Manila, and Containers in OpenStackThe State of Ceph, Manila, and Containers in OpenStack
The State of Ceph, Manila, and Containers in OpenStackSage Weil
 

En vedette (12)

Gluster overview & future directions vault 2015
Gluster overview & future directions vault 2015Gluster overview & future directions vault 2015
Gluster overview & future directions vault 2015
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
 
B 8スポンサー講演資料 osnexus steven umbehocker (アファーム・ビジネスパートナーズ株)
B 8スポンサー講演資料 osnexus steven umbehocker (アファーム・ビジネスパートナーズ株)B 8スポンサー講演資料 osnexus steven umbehocker (アファーム・ビジネスパートナーズ株)
B 8スポンサー講演資料 osnexus steven umbehocker (アファーム・ビジネスパートナーズ株)
 
Cephのベンチマークをしました
CephのベンチマークをしましたCephのベンチマークをしました
Cephのベンチマークをしました
 
Introduction to highly_availablenfs_server_on_scale-out_storage_systems_based...
Introduction to highly_availablenfs_server_on_scale-out_storage_systems_based...Introduction to highly_availablenfs_server_on_scale-out_storage_systems_based...
Introduction to highly_availablenfs_server_on_scale-out_storage_systems_based...
 
BSides London - Scapy Workshop
BSides London - Scapy WorkshopBSides London - Scapy Workshop
BSides London - Scapy Workshop
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Lisa 2015-gluster fs-introduction
Lisa 2015-gluster fs-introductionLisa 2015-gluster fs-introduction
Lisa 2015-gluster fs-introduction
 
GlusterFs Architecture & Roadmap - LinuxCon EU 2013
GlusterFs Architecture & Roadmap - LinuxCon EU 2013GlusterFs Architecture & Roadmap - LinuxCon EU 2013
GlusterFs Architecture & Roadmap - LinuxCon EU 2013
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Cloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop SampleCloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop Sample
 
The State of Ceph, Manila, and Containers in OpenStack
The State of Ceph, Manila, and Containers in OpenStackThe State of Ceph, Manila, and Containers in OpenStack
The State of Ceph, Manila, and Containers in OpenStack
 

Similaire à Finding the Right Balance: Security vs. Performance with Network Storage Systems

Presented by: Ahmar Abbas, Director, Blackboard ASP Services
Presented by: Ahmar Abbas, Director, Blackboard ASP ServicesPresented by: Ahmar Abbas, Director, Blackboard ASP Services
Presented by: Ahmar Abbas, Director, Blackboard ASP Serviceswebhostingguy
 
What's new in Confluent 3.2 and Apache Kafka 0.10.2
What's new in Confluent 3.2 and Apache Kafka 0.10.2 What's new in Confluent 3.2 and Apache Kafka 0.10.2
What's new in Confluent 3.2 and Apache Kafka 0.10.2 confluent
 
Resume_Manu.MS
Resume_Manu.MSResume_Manu.MS
Resume_Manu.MSManu Mohan
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationIRJET Journal
 
OpenStack Security Project
OpenStack Security ProjectOpenStack Security Project
OpenStack Security ProjectTravis McPeak
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingveena venugopal
 
Ph.D Annual Report III
Ph.D Annual Report IIIPh.D Annual Report III
Ph.D Annual Report IIIMatteo Avalle
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignCisco Canada
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA Cyber Security
 
SDN: is it a solution for network security?
SDN: is it a solution for network security?SDN: is it a solution for network security?
SDN: is it a solution for network security?ARCCN
 
Building Disaster Recovery as a Service:
Building Disaster Recovery as a Service:Building Disaster Recovery as a Service:
Building Disaster Recovery as a Service:Alexandre Verkinderen
 
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)Ramesh Nagappan
 
Ucs invicta & application performance
Ucs invicta & application performanceUcs invicta & application performance
Ucs invicta & application performancesolarisyougood
 
Trivadis TechEvent 2017 Oracle on azure by Michael Schwarzgorn
Trivadis TechEvent 2017 Oracle on azure by Michael SchwarzgornTrivadis TechEvent 2017 Oracle on azure by Michael Schwarzgorn
Trivadis TechEvent 2017 Oracle on azure by Michael SchwarzgornTrivadis
 
Monitoring Apache Kafka with Confluent Control Center
Monitoring Apache Kafka with Confluent Control Center   Monitoring Apache Kafka with Confluent Control Center
Monitoring Apache Kafka with Confluent Control Center confluent
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsRightScale
 
It's Prime Time for OpenStack--What Are You Waiting For?
It's Prime Time for OpenStack--What Are You Waiting For?It's Prime Time for OpenStack--What Are You Waiting For?
It's Prime Time for OpenStack--What Are You Waiting For?Veritas Technologies LLC
 

Similaire à Finding the Right Balance: Security vs. Performance with Network Storage Systems (20)

Presented by: Ahmar Abbas, Director, Blackboard ASP Services
Presented by: Ahmar Abbas, Director, Blackboard ASP ServicesPresented by: Ahmar Abbas, Director, Blackboard ASP Services
Presented by: Ahmar Abbas, Director, Blackboard ASP Services
 
What's new in Confluent 3.2 and Apache Kafka 0.10.2
What's new in Confluent 3.2 and Apache Kafka 0.10.2 What's new in Confluent 3.2 and Apache Kafka 0.10.2
What's new in Confluent 3.2 and Apache Kafka 0.10.2
 
Resume_Manu.MS
Resume_Manu.MSResume_Manu.MS
Resume_Manu.MS
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
 
OpenStack Security Project
OpenStack Security ProjectOpenStack Security Project
OpenStack Security Project
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
Ph.D Annual Report III
Ph.D Annual Report IIIPh.D Annual Report III
Ph.D Annual Report III
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture Design
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
SDN: is it a solution for network security?
SDN: is it a solution for network security?SDN: is it a solution for network security?
SDN: is it a solution for network security?
 
Building Disaster Recovery as a Service:
Building Disaster Recovery as a Service:Building Disaster Recovery as a Service:
Building Disaster Recovery as a Service:
 
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
 
Spotify services (SDC 2013)
Spotify services (SDC 2013)Spotify services (SDC 2013)
Spotify services (SDC 2013)
 
Ucs invicta & application performance
Ucs invicta & application performanceUcs invicta & application performance
Ucs invicta & application performance
 
Trivadis TechEvent 2017 Oracle on azure by Michael Schwarzgorn
Trivadis TechEvent 2017 Oracle on azure by Michael SchwarzgornTrivadis TechEvent 2017 Oracle on azure by Michael Schwarzgorn
Trivadis TechEvent 2017 Oracle on azure by Michael Schwarzgorn
 
VPN in Virtualized DataCenter
VPN in Virtualized DataCenterVPN in Virtualized DataCenter
VPN in Virtualized DataCenter
 
Monitoring Apache Kafka with Confluent Control Center
Monitoring Apache Kafka with Confluent Control Center   Monitoring Apache Kafka with Confluent Control Center
Monitoring Apache Kafka with Confluent Control Center
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
It's Prime Time for OpenStack--What Are You Waiting For?
It's Prime Time for OpenStack--What Are You Waiting For?It's Prime Time for OpenStack--What Are You Waiting For?
It's Prime Time for OpenStack--What Are You Waiting For?
 

Dernier

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Finding the Right Balance: Security vs. Performance with Network Storage Systems

  • 1. Arun Olappamanna Vasudevan Stony Brook University http://www.fsl.cs.sunysb.edu/ Finding the Right Balance: Security vs. Performance with Network Storage Systems   A  Master’s  Thesis  
  • 2. Summary of Contributions l  Co-developed a secure NFSv4 proxy with integrity-checking, encryption, anti- virus, and cache l  Contributed to NFS-Ganesha project to support stacking of multiple FSALs l  Developed buffer scanner in ClamAV 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 2 LOC Proxy-cache, Anti-virus Integrity- Encryption Total Source 9,264 3,586 12,850
  • 3. l  Motivation l  Background l  Design l  Implementation l  Evaluation l  Conclusions and Future Work 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 3 Outline
  • 4. Cloud Storage l  Availability u Google Cloud Platform @ 99.9973% up- time l  Scalability l  Economical l  Accessibility l  Easy to share and collaborate documents 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 4
  • 5. Security Concerns l  Confidentiality u Sony Pictures Entertainment u Photos of celebrities in iCloud hack l  Integrity u CERN – petabyte scale data u 22/33,700 files corrupted (8.7 TB) l  Availability u Symantec report – 43% of respondents have lost data in cloud! 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 5
  • 6. Threat Model 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 6 Cloud Secure Proxy Clients LAN WAN Trusted Untrusted Semi-trusted
  • 7. HTTPI Server Authentication Message Integrity Message Confidentiality HTTP ✖ ✖ ✖ HTTPS ✔ ✔ ✔ HTTPI ✔ ✔ ✖ 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 7
  • 8. b l  Motivation l  Background l  Design l  Evaluation l  Implementation l  Conclusions and Future Work 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 8 Outline
  • 9. NFSv4 and Cloud l  Cloud storage gateways l  Amazon Elastic File System (EFS) l  Cloud NAS u Zadara Storage u SoftNAS l  NFSv4 u Compounds u Delegation u pNFS 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 9
  • 10. Example: IBM Panache 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 10 Client Client Client Client Panache cluster GPFS pNFS WAN
  • 11. l  Motivation l  Background l  Design l  Implementation l  Evaluation l  Conclusions and Future Work 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 11 Outline
  • 12. Design Goals l  Advanced security features u Encryption, integrity-check, anti-virus u Security policies l  Minimal performance penalty u Cache l  Easy to develop and maintain u Proxy architecture u Layered implementation 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 12
  • 13. Proxy Architecture 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 13 Server Proxy with security and cache Clients LAN WAN NFS NFS
  • 14. NFS-Ganesha 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 14 Client Proxy NFSv4 Cache_inode Server Stackable FSAL FSAL_ PROXY open read write pxy_open pxy_read pxy_write File System Abstraction Layers (FSAL)
  • 15. Layered Architecture 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 15 Client Proxy Server Security Cache Client Proxy Server Cache Security Model A Model B
  • 16. Model A Item Support? Write-back cache ✔ Protect against bad data in cache from server ✖ Protect against bad data in cache from client ✔ Additional data for security ✔ Modification of data ✖ Handling security updates ✔ 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 16 Client Proxy Server Security Cache
  • 17. Model A (Write Path) 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 17
  • 18. Model B Item Support? Write-back cache ✖ Protect against bad data in cache from server ✔ Protect against bad data in cache from client ✖ Additional data for security ✖ Modification of data ✔ Handling security updates ✖ 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 18 Client Proxy Server Cache Security
  • 19. Final Hybrid Design l  Cache – Read and write in block units l  Anti-virus protects against malware from clients l  Crypto and integrity protect confidentiality and integrity of data in server 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 19 Client Proxy Server Anti-virus Cache Crypto Integrity
  • 20. l  Motivation l  Background l  Design l  Implementation l  Evaluation l  Conclusions and Future Work 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 20 Outline
  • 21. Anti-Virus l  ClamAV u Signature-based anti-virus scanner u Full-file scans l  Server-data is protected by integrity u Scan only writes from clients u Every 5 minutes (configurable) and at close 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 21
  • 22. Cache l  Write-back data cache u Every 5 minutes (configurable) and at close u Meta-data is not cached l  Persistent cache u Sparse local files for cached remote files u Page-cache in memory l  Thread-safe implementation u Per-file range locks u Handling asynchronous write-backs 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 22
  • 23. Integrity l  SCSI standard Data Integrity Field (DIF) 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 23
  • 24. Integrity with NFSv4.2 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 24 APP OS NFS Client NFS Server OS HBA Device WAN DIX DIF WRITE_PLUS(data, integrity_tag) READ_PLUS: data, integrity_tag WRITE(data) WRITE(data) READ: data READ: data DIX: Data Integrity eXtension
  • 25. Integrity and Encryption 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 25 PDATA ADATA Cipher-text Integrity_tag AES-GCM Plain-text data Authentication data File key
  • 26. l  Motivation l  Background l  Design l  Implementation l  Evaluation l  Conclusions and Future Work 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 26 Outline
  • 27. Experimental Setup 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 27 Virtual SCSI device with DIX support Proxy Anti-virus Cache Crypto Integrity Client 1 Client 3 Client 2 Client 4 Client 5 Server LAN (0.2ms RTT) 10 GbE WAN (30ms RTT) 1 GbE
  • 28. Experiments l  Micro-workloads u 100 files pre-allocated u Repeat for 2 minutes: § Open a random file § Read n times § Write m times § Close file l  Macro-workloads (Filebench) u File server and Mail server u Web server 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 28
  • 29. Combinations of Features Configs Proxy Integrity Encryption Caching Anti-virus P (baseline) ✔ ✖ ✖ ✖ ✖ I ✔ ✔ ✖ ✖ ✖ IE ✔ ✔ ✔ ✖ ✖ IC ✔ ✔ ✖ ✔ ✖ ICE ✔ ✔ ✔ ✔ ✖ ICEA ✔ ✔ ✔ ✔ ✔ 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 29
  • 30. 1:1 Read-Write ratio 1 MB 0 20 40 60 80 100 120 140 160 P I IC IE ICE ICEA #Ops/Sec Security and Caching Configs 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 30 2.2X 2.3X
  • 31. 1:1 Read-Write ratio 10 MB 0 20 40 60 80 100 120 140 160 180 P I IC IE ICE ICEA #Ops/Sec Security and Caching Configs 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 31 -21% 2.9X 2.4X -23%
  • 32. Speed-up vs. Read-Write ratio 0 1 2 3 4 5 6 7 8 9 10 1 2 4 8 16 SpeedupFactorRelativetoBaseline Read-to-Write Ratio I IC ICE ICEA 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 32
  • 33. 1:16 Read-Write ratio 1 MB 0 5 10 15 20 25 30 35 40 45 50 P I IC IE ICE ICEA #Ops/Sec Security and Caching Configs 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 33 +5%
  • 34. File Server Workload 0 5 10 15 20 25 30 35 40 45 P I IC IE ICE ICEA #Ops/Sec Security and Caching Configs 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 34 -25%
  • 35. Web Server Workload 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 35 0 20 40 60 80 100 120 140 160 180 200 P I IC IE ICE ICEA #Ops/Sec Security and Caching Configs -60% +77% +75%
  • 36. Evaluation Summary l  Integrity u Overhead: 3–26% l  Encryption with integrity u No additional overhead l  Anti-virus u Overhead: up to 23% for 10MB files l  Cache u Performance: up to 8x l  File server, Mail server, Web server u With all features: 23–28% overhead 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 36
  • 37. l  Motivation l  Background l  Design l  Implementation l  Evaluation l  Conclusions and Future Work 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 37 Outline
  • 38. Conclusions l  Designed and implemented a secure NFS proxy with cloud back-end l  Overhead of security u Integrity and Encryption give similar overheads u Anti-virus overhead depends on file-size l  Caching can offset security overhead to a great extent 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 38
  • 39. Future Work l  Security u Use Merkle tree or versioning scheme for integrity u Meta-data confidentiality l  Performance u Anti-virus scanning incrementally u Relax NFS strict consistency §  Use RESTful protocols between proxy and server l  Kurma – Secure Geo-Replicated Multi-Cloud Storage Gateways 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 39
  • 40. Acknowledgements l  My advisor, Dr. Erez Zadok l  Ming Chen, Kelong Wang l  My family and friends l  Committee members l  NSF 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 40
  • 41. Arun Olappamanna Vasudevan Stony Brook University http://www.fsl.cs.sunysb.edu/ Finding the Right Balance: Security vs. Performance with Network Storage Systems   A  Master’s  Thesis   Q&A  
  • 42. Kurma: Secure Geo-Replicated Multi-Cloud Storage Gateways Region 1 Clients Region 2 metadata metadata metadata Region 3 Azure S3 Drive Untrusted Secure Gateway Public Clouds 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 42
  • 43. Model A (Read Path) 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 43
  • 44. Model B (Read Path) 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 44
  • 45. Model B (Write Path) 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 45
  • 46. Final Hybrid Design (Read Path) 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 46
  • 47. Final Hybrid Design (Write Path) 05/15/2015 Arun Olappamanna Vasudevan—Masters Defense 47