SlideShare a Scribd company logo
1 of 30
© 2017 Nokia1
Assuring Virtual Network Function Image Integrity and
Host Sealing in Telco Cloud
Shankar Lal, Sowmya Ravidas, Ian Oliver, Tarik Taleb
24-05-2017
© 2017 Nokia2
Outline
• Rise of NFV & Security challenges
• Trusted Cloud Setup
• Testbed Experiment:
VNF Verification and Sealing process
• Performance Evaluation
• Use Cases & Conclusion
© 2017 Nokia3
Rise of NFV & Security Challenges
© 2017 Nokia4
Rise of NFV
• Dependency free software applications that can run on common of the shelf (COTS) computing platform
• Flexible and cost effective service without compromising the end user quality of service
• Operators can save their equipment costs, power consumption, specialized maintenance costs and enable network services quicker
which are mainly controlled by programmable software
• But NFV adds additional security challenges posed by cloud computing, Core virtualization and software defined network aspects of
the network.
<Document ID: change ID in footer or remove> <Change information classification in footer>
© 2017 Nokia5
Telco Cloud Security Requirement
<Document ID: change ID in footer or remove> <Change information classification in footer>
●TelcoCloud runs mission critical infrastructure for its communications systems
• Cannot trust just anyone for: security reasons,
• privacy reasons, legal reasons (telco law, surveillance etc)
• TelcoCloud is NOT a general purpose environment
●Detection of unauthorized modification
●Reduce blind trust in platform
© 2017 Nokia6
6
Our Focused Security Problems
Geographical locality of VNFsVNF image modification
© 2017 Nokia7
Trusted Cloud Setup
© 2017 Nokia8
Components of Trusted Cloud
• Trusted Platform Module (TPM)
Hardware module used to store passwords, cryptographic keys, certificates and other sensitive information in its
PCR registers.
• Trusted Boot
Measures all the binaries of the system components (i.e., firmware code,
BIOS, OS kernel and hypervisor code) at boot time and writes the hash measurements in TPM’s secure storage.
• Remote Attestation Service
Software mechanism integrated with TPM, for attestating the boot time integrity of the remote hosts.
<Document ID: change ID in footer or remove> <Change information classification in footer>
© 2017 Nokia9
9
Trusted Cloud Setup
TPM as a core root of trust
Attestation of NFVI hosts
© 2017 Nokia10
Testbed Experiment:
VNF Verification and Sealing process
© 2017 Nokia11
Testbed Setup
• OpenStack based cloud infrastructure (Kilo version)
• Four phyiscal server machines: Two Intel Xeon Servers E5-2600 v3 @2.20 GHz with 72 GB RAM and TPM version 1.2,
two HP ProLiant servers DL360 G5 having Intel Xeon CPU 5160 @3.00GHz and 24GB RAM.
• Security Orchestrator (SecO) server based on NodeJS platform
• Attestation Server (OpenCIT)
• Experiments on both KVM and Docker container
© 2017 Nokia12
Modified NFV Reference Architecture
© 2017 Nokia13
13
Verification and Sealing process
(1/5)
1. VNF image integrity verification using cryptographic signature verification
-SHA256 hash digest of VNF image is signed and signature stored in TSECO.
-For verification, fresh hash digest is recalculated and verified against the signature to detect tampering at VNF launch
time.
2. VNF host sealing using TPM PCR registers
-Sealing policy (based on PCR values) is defined in image metadata
-Current PCR values of platforms are fetched using Attestation server
© 2017 Nokia14
14
VNF Startup Integrity: Signing Mechanism
Verification Process
Signing Process
Verification and Sealing process (2/5)
© 2017 Nokia15
15
Sealing VNFs to Specific Platforms having TPM module
Verification and Sealing process (3/5)
© 2017 Nokia16
16
VNF-Host Sealing Process
Verification and Sealing process (4/5)
© 2017 Nokia17
Verification and Sealing process (5/5)
© 2017 Nokia18
Performance Evaluation
© 2017 Nokia19
Performance Evaluation (1/4)
Performance Metrics:
• Average overhead time after incorporating these solutions
• Selection of best hashing algorithm
• Mean response time of SECO to response to signature verification requests
© 2017 Nokia20
20
Performance Evaluation (2/4)
Comparison of VNF normal launch time and with signature verification and host sealing
© 2017 Nokia21
21
Performance Evaluation (3/4)
Comparison of time calculation of hash digest of VNF images
© 2017 Nokia22
Performance Evaluation (4/4)
SecO performance test on KVM and Docker
© 2017 Nokia23
Use Cases & Conclusion
© 2017 Nokia24
24
Use Cases
• Detection of unauthorized VNF image tampering
• VNF vendors can sign their VNF images to facilitate the mobile operators to verify the proof of ownership.
• VNF-Host sealing method can be useful in applications which require digital right management (DRM). A MNO can
define custom policies that would enforce VNFs to start only on particular platforms and refuse to launch them if the
platform is different.
© 2017 Nokia25
25
Conclusion
●A TPM alone does not and can not secure a system
●Many additional challenges arise in Trusted NFV:
− Resource management and fault tolerance
− Extensive resource selection policies and fault tolerant mechanism needs be defined on trusted resources
●Run time trust:
● What happens when system compromises during run time
● Definition is very vague and ill-defined
●Trust chain management is unsolved
● Identity management of NFV nodes
● Placement of MANO components
● Multiple attestation
© 2017 Nokia26
Thank you for your attention.
Questions?
© 2017 Nokia29
Copyright and confidentiality
The contents of this document are proprietary and confidential property of
Nokia. This document is provided subject to confidentiality obligations of the
applicable agreement(s).
This document is intended for use of Nokia’s customers and collaborators only
for the purpose for which this document is submitted by Nokia. No part of this
document may be reproduced or made available to the public or to any third
party in any form or means without the prior written permission of Nokia. This
document is to be used by properly trained professional personnel. Any use of
the contents in this document is limitedstrictly to the use(s) specifically created
in the applicable agreement(s) under which the document is submitted. The
user of this document may voluntarily provide suggestions, comments or other
feedback to Nokia in respect of the contents of this document ("Feedback").
Such Feedback may be used in Nokia products and related specifications or
other documentation. Accordingly, if the user of this document gives Nokia
Feedback on the contents of this document, Nokia may freely use, disclose,
reproduce, license, distribute and otherwise commercialize the feedback in any
Nokia product, technology, service, specificationor other documentation.
Nokia operates a policy of ongoing development. Nokia reserves the right to
make changes and improvements to any of the products and/or services
described in this document or withdraw this document at any time without prior
notice.
The contents of this document are provided "as is". Except as required by
applicable law, no warranties of any kind, either express or implied,including,
but not limitedto, the implied warranties of merchantability and fitness for a
particular purpose, are made in relation to the accuracy, reliability or contents of
this document. NOKIA SHALL NOT BE RESPONSIBLE IN ANY EVENT FOR
ERRORS IN THIS DOCUMENT or for any loss of data or income or any special,
incidental, consequential, indirect or direct damages howsoever caused, that
might arise from the use of this document or any contents of this document.
This document and the product(s) it describes
are protected by copyright according to the
applicable laws.
Nokia is a registered trademark of Nokia Corporation. Other product and
company names mentioned herein may be trademarks or trade names of their
respective owners.
<Document ID: change ID in footer or remove> <Change information classification in footer>
© 2017 Nokia30
Please delete this slide if document is uncontrolled
Revision history and metadata
<Document ID: change ID in footer or remove> <Change information classification in footer>
Document ID: DXXXXXXXXX
Document Location:
Organization:
Version Description of charges Date Author Owner Status
Reviewed by Reviewed date
Approver
Approval date
DD-MM-YYYY DD-MM-YYYY DD-MM-YYYY

More Related Content

What's hot

Telefónica Edge Computing Case Study
Telefónica Edge Computing Case StudyTelefónica Edge Computing Case Study
Telefónica Edge Computing Case StudyDavid Artuñedo
 
SCF Partners' Day: ETSI Multi-Access Edge Computing
SCF Partners' Day: ETSI Multi-Access Edge ComputingSCF Partners' Day: ETSI Multi-Access Edge Computing
SCF Partners' Day: ETSI Multi-Access Edge ComputingSmall Cell Forum
 
Edge computing: Cord build 17 telefonica use cases
Edge computing: Cord build 17 telefonica use casesEdge computing: Cord build 17 telefonica use cases
Edge computing: Cord build 17 telefonica use casesPatrick Lopez
 
Evolving to a New Generation Network based on IP, SDN, NFV & Cloud
Evolving to a New Generation Networkbased on IP, SDN, NFV & CloudEvolving to a New Generation Networkbased on IP, SDN, NFV & Cloud
Evolving to a New Generation Network based on IP, SDN, NFV & CloudEricsson
 
Virtualized Transport for Edge Computing Services
Virtualized Transport for Edge Computing ServicesVirtualized Transport for Edge Computing Services
Virtualized Transport for Edge Computing ServicesSigal Biran-Nagar
 
OSS in the era of SDN and NFV: Evolution vs Revolution - What we can learn f...
OSS in the era of SDN and NFV:  Evolution vs Revolution - What we can learn f...OSS in the era of SDN and NFV:  Evolution vs Revolution - What we can learn f...
OSS in the era of SDN and NFV: Evolution vs Revolution - What we can learn f...Colt Technology Services
 
{Ca} SDN NFV in wireless networks 2015 for LTE world Summit
{Ca} SDN NFV in wireless networks 2015 for LTE world Summit{Ca} SDN NFV in wireless networks 2015 for LTE world Summit
{Ca} SDN NFV in wireless networks 2015 for LTE world SummitPatrick Lopez
 
Orchestrating, operationalizing, monetizing SDN/NFV enabled networks
Orchestrating, operationalizing, monetizing SDN/NFV enabled networksOrchestrating, operationalizing, monetizing SDN/NFV enabled networks
Orchestrating, operationalizing, monetizing SDN/NFV enabled networksEricsson
 
Ericsson introduces a hyperscale cloud solution
Ericsson introduces a hyperscale cloud solutionEricsson introduces a hyperscale cloud solution
Ericsson introduces a hyperscale cloud solutionEricsson
 
Colt's evolution from MPLS to Cloud Networking
Colt's evolution from MPLS to Cloud Networking Colt's evolution from MPLS to Cloud Networking
Colt's evolution from MPLS to Cloud Networking Colt Technology Services
 
ECI Telecom: NPT for PTN
ECI Telecom: NPT for PTNECI Telecom: NPT for PTN
ECI Telecom: NPT for PTNYanivt
 
IMS WebRTC Workshop Metaswitch Project Clearwater
IMS WebRTC Workshop Metaswitch Project ClearwaterIMS WebRTC Workshop Metaswitch Project Clearwater
IMS WebRTC Workshop Metaswitch Project ClearwaterAlan Quayle
 
ECI - ElastiGRID™ - For utilities and strategic industries
ECI - ElastiGRID™ - For utilities and strategic industriesECI - ElastiGRID™ - For utilities and strategic industries
ECI - ElastiGRID™ - For utilities and strategic industriesECI – THE ELASTIC NETWORK™
 
Edge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersEdge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersPatrick Lopez
 
Overture presentation on Central Office (Exchange): Home to the New Telco Clo...
Overture presentation on Central Office (Exchange): Home to the New Telco Clo...Overture presentation on Central Office (Exchange): Home to the New Telco Clo...
Overture presentation on Central Office (Exchange): Home to the New Telco Clo...Overture Networks
 
Colt's SDN/NFV Vision
Colt's SDN/NFV VisionColt's SDN/NFV Vision
Colt's SDN/NFV VisionFIBRE Testbed
 

What's hot (20)

Telefónica Edge Computing Case Study
Telefónica Edge Computing Case StudyTelefónica Edge Computing Case Study
Telefónica Edge Computing Case Study
 
SCF Partners' Day: ETSI Multi-Access Edge Computing
SCF Partners' Day: ETSI Multi-Access Edge ComputingSCF Partners' Day: ETSI Multi-Access Edge Computing
SCF Partners' Day: ETSI Multi-Access Edge Computing
 
Edge computing: Cord build 17 telefonica use cases
Edge computing: Cord build 17 telefonica use casesEdge computing: Cord build 17 telefonica use cases
Edge computing: Cord build 17 telefonica use cases
 
NFV - Telco Transformation Unfolded
NFV - Telco Transformation Unfolded NFV - Telco Transformation Unfolded
NFV - Telco Transformation Unfolded
 
Simplify Operations
Simplify OperationsSimplify Operations
Simplify Operations
 
Evolving to a New Generation Network based on IP, SDN, NFV & Cloud
Evolving to a New Generation Networkbased on IP, SDN, NFV & CloudEvolving to a New Generation Networkbased on IP, SDN, NFV & Cloud
Evolving to a New Generation Network based on IP, SDN, NFV & Cloud
 
Cisco at OFC 2016
Cisco at OFC 2016Cisco at OFC 2016
Cisco at OFC 2016
 
Virtualized Transport for Edge Computing Services
Virtualized Transport for Edge Computing ServicesVirtualized Transport for Edge Computing Services
Virtualized Transport for Edge Computing Services
 
OSS in the era of SDN and NFV: Evolution vs Revolution - What we can learn f...
OSS in the era of SDN and NFV:  Evolution vs Revolution - What we can learn f...OSS in the era of SDN and NFV:  Evolution vs Revolution - What we can learn f...
OSS in the era of SDN and NFV: Evolution vs Revolution - What we can learn f...
 
{Ca} SDN NFV in wireless networks 2015 for LTE world Summit
{Ca} SDN NFV in wireless networks 2015 for LTE world Summit{Ca} SDN NFV in wireless networks 2015 for LTE world Summit
{Ca} SDN NFV in wireless networks 2015 for LTE world Summit
 
Orchestrating, operationalizing, monetizing SDN/NFV enabled networks
Orchestrating, operationalizing, monetizing SDN/NFV enabled networksOrchestrating, operationalizing, monetizing SDN/NFV enabled networks
Orchestrating, operationalizing, monetizing SDN/NFV enabled networks
 
Ericsson introduces a hyperscale cloud solution
Ericsson introduces a hyperscale cloud solutionEricsson introduces a hyperscale cloud solution
Ericsson introduces a hyperscale cloud solution
 
Colt's evolution from MPLS to Cloud Networking
Colt's evolution from MPLS to Cloud Networking Colt's evolution from MPLS to Cloud Networking
Colt's evolution from MPLS to Cloud Networking
 
ECI Telecom: NPT for PTN
ECI Telecom: NPT for PTNECI Telecom: NPT for PTN
ECI Telecom: NPT for PTN
 
IMS WebRTC Workshop Metaswitch Project Clearwater
IMS WebRTC Workshop Metaswitch Project ClearwaterIMS WebRTC Workshop Metaswitch Project Clearwater
IMS WebRTC Workshop Metaswitch Project Clearwater
 
ECI - ElastiGRID™ - For utilities and strategic industries
ECI - ElastiGRID™ - For utilities and strategic industriesECI - ElastiGRID™ - For utilities and strategic industries
ECI - ElastiGRID™ - For utilities and strategic industries
 
Colt Network On Demand
Colt Network On DemandColt Network On Demand
Colt Network On Demand
 
Edge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersEdge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalers
 
Overture presentation on Central Office (Exchange): Home to the New Telco Clo...
Overture presentation on Central Office (Exchange): Home to the New Telco Clo...Overture presentation on Central Office (Exchange): Home to the New Telco Clo...
Overture presentation on Central Office (Exchange): Home to the New Telco Clo...
 
Colt's SDN/NFV Vision
Colt's SDN/NFV VisionColt's SDN/NFV Vision
Colt's SDN/NFV Vision
 

Similar to Assuring VNF Image Integrity in Telco Cloud

7. CLT 2017 core NaaS RCM 21jun17
7. CLT 2017 core NaaS RCM 21jun177. CLT 2017 core NaaS RCM 21jun17
7. CLT 2017 core NaaS RCM 21jun17PROMTEL México
 
Summit 16: OPNFV: Moving to Support Real Time Applications
Summit 16: OPNFV: Moving to Support Real Time ApplicationsSummit 16: OPNFV: Moving to Support Real Time Applications
Summit 16: OPNFV: Moving to Support Real Time ApplicationsOPNFV
 
Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...ADVA
 
PLNOG15: NFV: Lessons learned from production deployments and current observa...
PLNOG15: NFV: Lessons learned from production deployments and current observa...PLNOG15: NFV: Lessons learned from production deployments and current observa...
PLNOG15: NFV: Lessons learned from production deployments and current observa...PROIDEA
 
3D Users distribution for small cells network design
3D Users distribution for small cells network design3D Users distribution for small cells network design
3D Users distribution for small cells network designSmall Cell Forum
 
Ensemble Launches Major Upgrade to NFV Platform
Ensemble Launches Major Upgrade to NFV PlatformEnsemble Launches Major Upgrade to NFV Platform
Ensemble Launches Major Upgrade to NFV PlatformADVA
 
ATS-Overview_v0.1.pptx
ATS-Overview_v0.1.pptxATS-Overview_v0.1.pptx
ATS-Overview_v0.1.pptxNakhoudah
 
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...Haidee McMahon
 
NF101: Nutanix 101
NF101: Nutanix 101NF101: Nutanix 101
NF101: Nutanix 101NEXTtour
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs ExplainedAlan Percy
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing3G4G
 
Network Function Virtualisation: a tutorial
Network Function Virtualisation: a tutorialNetwork Function Virtualisation: a tutorial
Network Function Virtualisation: a tutorialAPNIC
 
vmw-nokia-registers-vcloud-nfv-solution-overview.pdf
vmw-nokia-registers-vcloud-nfv-solution-overview.pdfvmw-nokia-registers-vcloud-nfv-solution-overview.pdf
vmw-nokia-registers-vcloud-nfv-solution-overview.pdfAsitSwain5
 
VMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
 
Making NFV Easy
Making NFV EasyMaking NFV Easy
Making NFV EasyADVA
 
.Next 2017 Updates
.Next 2017 Updates.Next 2017 Updates
.Next 2017 UpdatesNEXTtour
 
Nutanix .Next 2017 - Choosing The Right Nutanix Platform
Nutanix .Next 2017 - Choosing The Right Nutanix PlatformNutanix .Next 2017 - Choosing The Right Nutanix Platform
Nutanix .Next 2017 - Choosing The Right Nutanix PlatformMarc Trouard-Riolle
 

Similar to Assuring VNF Image Integrity in Telco Cloud (20)

7. CLT 2017 core NaaS RCM 21jun17
7. CLT 2017 core NaaS RCM 21jun177. CLT 2017 core NaaS RCM 21jun17
7. CLT 2017 core NaaS RCM 21jun17
 
Summit 16: OPNFV: Moving to Support Real Time Applications
Summit 16: OPNFV: Moving to Support Real Time ApplicationsSummit 16: OPNFV: Moving to Support Real Time Applications
Summit 16: OPNFV: Moving to Support Real Time Applications
 
Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...
 
PLNOG15: NFV: Lessons learned from production deployments and current observa...
PLNOG15: NFV: Lessons learned from production deployments and current observa...PLNOG15: NFV: Lessons learned from production deployments and current observa...
PLNOG15: NFV: Lessons learned from production deployments and current observa...
 
3D Users distribution for small cells network design
3D Users distribution for small cells network design3D Users distribution for small cells network design
3D Users distribution for small cells network design
 
Ensemble Launches Major Upgrade to NFV Platform
Ensemble Launches Major Upgrade to NFV PlatformEnsemble Launches Major Upgrade to NFV Platform
Ensemble Launches Major Upgrade to NFV Platform
 
ATS-Overview_v0.1.pptx
ATS-Overview_v0.1.pptxATS-Overview_v0.1.pptx
ATS-Overview_v0.1.pptx
 
Path to NFV Nirvana
Path to NFV NirvanaPath to NFV Nirvana
Path to NFV Nirvana
 
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017  - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
NF101: Nutanix 101
NF101: Nutanix 101NF101: Nutanix 101
NF101: Nutanix 101
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
 
Network Function Virtualisation: a tutorial
Network Function Virtualisation: a tutorialNetwork Function Virtualisation: a tutorial
Network Function Virtualisation: a tutorial
 
vmw-nokia-registers-vcloud-nfv-solution-overview.pdf
vmw-nokia-registers-vcloud-nfv-solution-overview.pdfvmw-nokia-registers-vcloud-nfv-solution-overview.pdf
vmw-nokia-registers-vcloud-nfv-solution-overview.pdf
 
VMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats New
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
Making NFV Easy
Making NFV EasyMaking NFV Easy
Making NFV Easy
 
.Next 2017 Updates
.Next 2017 Updates.Next 2017 Updates
.Next 2017 Updates
 
Nutanix .Next 2017 - Choosing The Right Nutanix Platform
Nutanix .Next 2017 - Choosing The Right Nutanix PlatformNutanix .Next 2017 - Choosing The Right Nutanix Platform
Nutanix .Next 2017 - Choosing The Right Nutanix Platform
 

Recently uploaded

Broad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxBroad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxjana861314
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
Zoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfZoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfSumit Kumar yadav
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPirithiRaju
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPirithiRaju
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...Sérgio Sacani
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)Areesha Ahmad
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)Areesha Ahmad
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfSumit Kumar yadav
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 

Recently uploaded (20)

Broad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxBroad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
Zoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfZoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdf
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdf
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 

Assuring VNF Image Integrity in Telco Cloud

  • 1. © 2017 Nokia1 Assuring Virtual Network Function Image Integrity and Host Sealing in Telco Cloud Shankar Lal, Sowmya Ravidas, Ian Oliver, Tarik Taleb 24-05-2017
  • 2. © 2017 Nokia2 Outline • Rise of NFV & Security challenges • Trusted Cloud Setup • Testbed Experiment: VNF Verification and Sealing process • Performance Evaluation • Use Cases & Conclusion
  • 3. © 2017 Nokia3 Rise of NFV & Security Challenges
  • 4. © 2017 Nokia4 Rise of NFV • Dependency free software applications that can run on common of the shelf (COTS) computing platform • Flexible and cost effective service without compromising the end user quality of service • Operators can save their equipment costs, power consumption, specialized maintenance costs and enable network services quicker which are mainly controlled by programmable software • But NFV adds additional security challenges posed by cloud computing, Core virtualization and software defined network aspects of the network. <Document ID: change ID in footer or remove> <Change information classification in footer>
  • 5. © 2017 Nokia5 Telco Cloud Security Requirement <Document ID: change ID in footer or remove> <Change information classification in footer> ●TelcoCloud runs mission critical infrastructure for its communications systems • Cannot trust just anyone for: security reasons, • privacy reasons, legal reasons (telco law, surveillance etc) • TelcoCloud is NOT a general purpose environment ●Detection of unauthorized modification ●Reduce blind trust in platform
  • 6. © 2017 Nokia6 6 Our Focused Security Problems Geographical locality of VNFsVNF image modification
  • 8. © 2017 Nokia8 Components of Trusted Cloud • Trusted Platform Module (TPM) Hardware module used to store passwords, cryptographic keys, certificates and other sensitive information in its PCR registers. • Trusted Boot Measures all the binaries of the system components (i.e., firmware code, BIOS, OS kernel and hypervisor code) at boot time and writes the hash measurements in TPM’s secure storage. • Remote Attestation Service Software mechanism integrated with TPM, for attestating the boot time integrity of the remote hosts. <Document ID: change ID in footer or remove> <Change information classification in footer>
  • 9. © 2017 Nokia9 9 Trusted Cloud Setup TPM as a core root of trust Attestation of NFVI hosts
  • 10. © 2017 Nokia10 Testbed Experiment: VNF Verification and Sealing process
  • 11. © 2017 Nokia11 Testbed Setup • OpenStack based cloud infrastructure (Kilo version) • Four phyiscal server machines: Two Intel Xeon Servers E5-2600 v3 @2.20 GHz with 72 GB RAM and TPM version 1.2, two HP ProLiant servers DL360 G5 having Intel Xeon CPU 5160 @3.00GHz and 24GB RAM. • Security Orchestrator (SecO) server based on NodeJS platform • Attestation Server (OpenCIT) • Experiments on both KVM and Docker container
  • 12. © 2017 Nokia12 Modified NFV Reference Architecture
  • 13. © 2017 Nokia13 13 Verification and Sealing process (1/5) 1. VNF image integrity verification using cryptographic signature verification -SHA256 hash digest of VNF image is signed and signature stored in TSECO. -For verification, fresh hash digest is recalculated and verified against the signature to detect tampering at VNF launch time. 2. VNF host sealing using TPM PCR registers -Sealing policy (based on PCR values) is defined in image metadata -Current PCR values of platforms are fetched using Attestation server
  • 14. © 2017 Nokia14 14 VNF Startup Integrity: Signing Mechanism Verification Process Signing Process Verification and Sealing process (2/5)
  • 15. © 2017 Nokia15 15 Sealing VNFs to Specific Platforms having TPM module Verification and Sealing process (3/5)
  • 16. © 2017 Nokia16 16 VNF-Host Sealing Process Verification and Sealing process (4/5)
  • 17. © 2017 Nokia17 Verification and Sealing process (5/5)
  • 19. © 2017 Nokia19 Performance Evaluation (1/4) Performance Metrics: • Average overhead time after incorporating these solutions • Selection of best hashing algorithm • Mean response time of SECO to response to signature verification requests
  • 20. © 2017 Nokia20 20 Performance Evaluation (2/4) Comparison of VNF normal launch time and with signature verification and host sealing
  • 21. © 2017 Nokia21 21 Performance Evaluation (3/4) Comparison of time calculation of hash digest of VNF images
  • 22. © 2017 Nokia22 Performance Evaluation (4/4) SecO performance test on KVM and Docker
  • 23. © 2017 Nokia23 Use Cases & Conclusion
  • 24. © 2017 Nokia24 24 Use Cases • Detection of unauthorized VNF image tampering • VNF vendors can sign their VNF images to facilitate the mobile operators to verify the proof of ownership. • VNF-Host sealing method can be useful in applications which require digital right management (DRM). A MNO can define custom policies that would enforce VNFs to start only on particular platforms and refuse to launch them if the platform is different.
  • 25. © 2017 Nokia25 25 Conclusion ●A TPM alone does not and can not secure a system ●Many additional challenges arise in Trusted NFV: − Resource management and fault tolerance − Extensive resource selection policies and fault tolerant mechanism needs be defined on trusted resources ●Run time trust: ● What happens when system compromises during run time ● Definition is very vague and ill-defined ●Trust chain management is unsolved ● Identity management of NFV nodes ● Placement of MANO components ● Multiple attestation
  • 26. © 2017 Nokia26 Thank you for your attention. Questions?
  • 27.
  • 28.
  • 29. © 2017 Nokia29 Copyright and confidentiality The contents of this document are proprietary and confidential property of Nokia. This document is provided subject to confidentiality obligations of the applicable agreement(s). This document is intended for use of Nokia’s customers and collaborators only for the purpose for which this document is submitted by Nokia. No part of this document may be reproduced or made available to the public or to any third party in any form or means without the prior written permission of Nokia. This document is to be used by properly trained professional personnel. Any use of the contents in this document is limitedstrictly to the use(s) specifically created in the applicable agreement(s) under which the document is submitted. The user of this document may voluntarily provide suggestions, comments or other feedback to Nokia in respect of the contents of this document ("Feedback"). Such Feedback may be used in Nokia products and related specifications or other documentation. Accordingly, if the user of this document gives Nokia Feedback on the contents of this document, Nokia may freely use, disclose, reproduce, license, distribute and otherwise commercialize the feedback in any Nokia product, technology, service, specificationor other documentation. Nokia operates a policy of ongoing development. Nokia reserves the right to make changes and improvements to any of the products and/or services described in this document or withdraw this document at any time without prior notice. The contents of this document are provided "as is". Except as required by applicable law, no warranties of any kind, either express or implied,including, but not limitedto, the implied warranties of merchantability and fitness for a particular purpose, are made in relation to the accuracy, reliability or contents of this document. NOKIA SHALL NOT BE RESPONSIBLE IN ANY EVENT FOR ERRORS IN THIS DOCUMENT or for any loss of data or income or any special, incidental, consequential, indirect or direct damages howsoever caused, that might arise from the use of this document or any contents of this document. This document and the product(s) it describes are protected by copyright according to the applicable laws. Nokia is a registered trademark of Nokia Corporation. Other product and company names mentioned herein may be trademarks or trade names of their respective owners. <Document ID: change ID in footer or remove> <Change information classification in footer>
  • 30. © 2017 Nokia30 Please delete this slide if document is uncontrolled Revision history and metadata <Document ID: change ID in footer or remove> <Change information classification in footer> Document ID: DXXXXXXXXX Document Location: Organization: Version Description of charges Date Author Owner Status Reviewed by Reviewed date Approver Approval date DD-MM-YYYY DD-MM-YYYY DD-MM-YYYY

Editor's Notes

  1. Future Work Encrypt and sign and store in TPM Place diagram on one slide above??
  2. Etsi architecture Telco cloud Specialised cloud towards telecommunication Increased bandwidth, to do specialised jobs, hardware routing controlled Standardised telecommunication cloud Hardware → virtualized components Cloud hardware, VNF, MANO VNFs->VNFc->VM
  3. External policy mechanism In case of multiple policies, we can order in terms of strength. Weaker policies can have mitigations which will be further investigated Measurement = hash Policy = where the image can be instantiated out of combinations of PCR Only run on machines with certain configurations