Final Deliverable
Final Deliverable
Final Deliverable
Page 1 of 5
Information Assurance and Security
Page 2 of 5
Information Assurance and Security
Page 3 of 5
Information Assurance and Security
The use of “cloud computing” has become increasingly popular as the next
infrastructure for hosting data at deploying software services. Amazon’s Elastic Compute
Cloud (EC2), Microsoft’s Azure Service Platform, and Rack-space’s Mosso provides a
number of advantages including economies of scale, dynamic provisioning, and low capital
expenditures but it also introduces a range of new risks.
Some of these risks are self-evident and relate to the new trust relationship between
customer and cloud provider. Customers must trust their cloud providers to respect the
privacy of their data and the integrity of their computations. However, cloud infrastructures
can also introduce non-obvious threats from other customers due to how physical resources
can be shared between virtual machines.
There are plenty approaches for mitigating this risk. First, cloud providers may
obfuscate both the internal structure of their services and the placement policy to complicate
an adversary’s attempts to place a VM on the same physical machine as its target. For
example, providers might do well by inhibiting simple network-based co-residence checks.
However, such approaches might only slow down, and not entirely stop, a dedicated
attacker. Second, one may focus on the side-channel vulnerabilities themselves and employ
blinding techniques to minimize the information that can be leaked. This solution requires
being confident that all possible side-channels have been anticipated and blinded.
Ultimately, we believe that the best solution is simply to expose the risk and placement
decisions directly to users
Page 4 of 5
Information Assurance and Security
Page 5 of 5