Researchers on NC State's Centennial Campus Develop Enhanced Cloud-Computing Security SoftwareResearchers on North Carolina State University's Centennial Campus have developed new software that offers significantly enhanced security for cloud-computing systems.
By: Centennial Campus at NC State University Cloud computing is being hailed as a flexible, affordable way of offering computer resources to consumers. Under the cloud-computing paradigm, the computational power and storage of multiple computers is pooled, and can be shared by multiple users. But concerns exist about hackers finding ways to insert malware into cloud computing systems. A new program called HyperSentry, developed by researchers at NC State and IBM, should help allay those fears. HyperSentry is security software that focuses on protecting hypervisors in virtual computing clouds. Hypervisors are programs that create the virtual workspace that allows different operating systems to run in isolation from one another – even though each of these systems is using computing power and storage capability on the same computer. Specifically, HyperSentry enables cloud administrators to measure the integrity of hypervisors in run time – meaning that the administrators can check to see whether a hypervisor has been breached by a third party, while the hypervisor is operating. “The concern is that an attacker could compromise a hypervisor, giving them control of the cloud,” says Dr. Peng Ning, professor of computer science at NC State and co-author of a paper describing the research. If a hypervisor is compromised, the attacker could do almost anything: access users’ sensitive information; “HyperSentry solves two problems,” Ning says. “It measures hypervisor integrity in a stealthy way, and it does so in the context of the hypervisor.” The fact that HyperSentry can check the integrity of a hypervisor in a stealthy way – checking the hypervisor without the hypervisor being aware of it – is important too. If a hypervisor is aware that it is being scrutinized, and has already been compromised, it can notify the malware. The malware, once alerted, can then restore the hypervisor to its normal state in order to avoid detection. Then the malware effectively hides until the security check is over. Once a compromised hypervisor has been detected, a cloud administrator can take action to respond to the compromise, such as shutting down the computer, performing additional investigations to identify the scope of the problem and limiting how far the damage can spread. The research is being presented Oct. 5 at the 17th ACM Conference on Computer and Communications Security in Chicago, Ill. The research was a part of the thesis work of NC State Ph.D. student Ahmed Azab, and was co-authored by Ning; NC State Ph.D. student Zhi Wang; Dr. Xuxian Jiang, an assistant professor of computer science at NC State; and Dr. Xiaolan Zhang and Nathan Skalsky of IBM. The work was done with funding from the U.S. Army Research Office, the National Science Foundation and IBM. NC State’s computer science department is part of the university’s College of Engineering and is located on Centennial Campus. About Centennial Campus and NC State University Centennial Campus (http://www.centennial.ncsu.edu) is an internationally recognized 1,314-acre research park and technology campus owned and operated by North Carolina University. Home to more than 60 corporate, government and non-profit partners, such as Red Hat, ABB, and the USDA, collaborative research projects vary from nanofibers and secure open systems technology to serious gaming and biomedical engineering. Four university college programs also have a significant presence on campus – College of Engineering, College of Veterinary Medicine, College of Textiles and the College of Education. NC State is one of the top research universities in the country, with expenditures in research approaching more than $325 million annually. The university ranks third among all public universities (without medical schools) in industry-sponsored research expenditures. (http://www.ncsu.edu) End
|
|