The Center for Autonomic Computing: Vision, Value and Capabilities
Download
Report
Transcript The Center for Autonomic Computing: Vision, Value and Capabilities
Autonomic Virtual Networks and
Applications in Cloud and
Collaborative Computing
Environments
Renato Figueiredo
Associate Professor
Center for Autonomic Computing
ACIS Lab
University of Florida
Center for Autonomic Computing
Intel Portland, April 30, 2010
Outlook
Architecting autonomic virtual networks
Isolation, security, encapsulation, dynamic configuration,
migration
Self-configuration, self-healing, self-optimization
Applications in cloud and collaborative environments
Virtual Private Clusters
Social VPNs
Archer: a collaborative environment for computer
architecture simulation
Ongoing/future work
2
Social VPNs
Focus on usability of security
VPNs: can recover Internet end-to-end connectivity
From a user’s perspective: it needs to be simple
My computer gets a virtual network card
It connects me directly to my social peers
All IP packets: authenticated, encrypted, end-to-end
No configuration besides establishing social links
Leverage well-known PKI techniques
All I need to do to is log in to a web based social network
Applications, middleware work as if the
computers were on the same local-area network
3
Social VPN Overview
Social relationships
web-based profiles,
email/chat networks.
Public key certificates
retrieved through social
API or XMPP
carol.facebook.ipop
10.10.0.2
node0.alice.facebook.ipop
10.10.0.3
Overlay network
(IPOP)
Alice’s services:
Samba share
RDP server
VoIP, Chat
Advertise to Bob, Carol
Bob: browses Alice’s SMB share
Symmetric keys
exchanged and point-topoint private tunnels
created on demand;
Social
Network API
Alice’s public key certificate
Bob’s public key certificate
Carol’s public key certificate
Social network Information system
Multicast-based
resource discovery
Social network
(e.g. Google chat)
Alice
Social
Network
Web interface
Bob
Carol
4
SocialVPN Control Plane
Use APIs of well-established social networks for
peer discovery and certificate exchange
Centralized user identity and data store for certificate
exchange
Facebook APIs and data store
Federated user identities and peer-to-peer
messaging for synchronous certificate exchange
XMPP online chat protocol (Google chat, Jabber.org;
Facebook has partial support)
May use DHT for asynchronous certificate exchange
5
SocialVPN Data Plane
IPOP core, with end-to-end security
Dynamic IP address assignment
Key to supporting IPv4 in large social networks
Facebook has more users than there are class A private IPs!
Avoid conflicts with local private networks
Dynamic IP translation; supports mobility
Key: while whole social network is huge, my social
network fits in a subnet
[Figueiredo et al, COPS 2008]
6
SocialVPN dynamic IP translation
Non-conflicting private network
10.10.x.y
Alice
Alice: 10.10.1.1
Bob: 10.10.1.2
Ann: 10.10.1.3
Src: 10.10.1.1
Dst: 10.10.1.3
VNIC
Src: 172.16.1.10
Dst: 172.16.1.1
VNIC
172.16.x.y
Ann
Ann: 172.16.1.1
Bill: 172.16.1.2
Alice: 172.16.1.10
Src: AliceOverlayID
Dst: AnnOverlayID
7
SocialVPN Connection times
128 nodes on Amazon EC2, 450 nodes on PlanetLab
-Majority of links formed in less than a second
-DHT lookup, symmetric key exchange
-Few additional seconds for NAT traversal
8
Per-node Bandwidth
Small cost of maintaining overlay connections
- 1KByte/s for 128 peers
9
Trust relationships
I manage who I trust - SocialVPN
Alice friend of Bob, Bob friend of Carol
Social VPN links: Alice <-> Bob, Bob <-> Carol
No direct connection between Alice and Carol
Self-signed certificates
Small-scale, ad-hoc; social VPN is not all-to-all connected
I delegate trust to a third party - GroupVPN
Alice, Bob and Carol trust Trent, a group moderator
Social VPN links: A<->B, B<->C, A<->C
Trent acts as CA, signing as a side-effect of approving user
GroupVPN is all-to-all connected
10
GroupVPN security management
IPOP creates VPN links autonomously
Key approaches:
But who decides on VPN membership?
How to multiplex many virtual private IP overlays over the
same P2P overlay?
Namespaces: separation of virtual IP address spaces
VPN configuration: Web-based group front-end to
manage certificates, automatic signing and configuration
Centralized user and certificate management,
decentralized VPN routing
Users create, configure VPN groups, namespaces
Group owner manages joining/leaving of a group
Certificate signing/revocation is automated
PKI infrastructure, simple usage model for virtual clusters
11