Page 175 - How Cloud Computing Is Transforming Business and Why You Cant Afford to Be Left Behind
P. 175

D ANGERS ABOUND: SECURITY IN THE C L O UD



                 “visible to anyone in the cloud.” Address numbers that are
                 close together are often sharing the same hardware in EC2,
                 the Review said, so through trial and error, a snooper could try
                 to place one of its virtual machines on the same servers.
                     “It is possible to carefully monitor how access to resources
                 fluctuates and thereby potentially glean sensitive information

                 about the victim,” said the report. It didn’t make it clear what
                 information might be gleaned from resource use, but many
                 security researchers have worried that it would be possible for
                 one virtual machine to spy on another if it could watch the ac-
                 tivity of the hypervisor. All virtual machines on the same phys-
                 ical server share one hypervisor, and each virtual machine’s
                 calls for hardware services must pass through the hypervisor.

                     In the same report, Eran Tromer, a postdoctoral researcher
                 in MIT’s Computer Science and Artificial Intelligence Labo-
                 ratory, and three colleagues from the University of California
                 at San Diego said that such a snooping attack was more likely
                 to succeed if the listener generated his virtual machines at the
                 same time as the target did. If a potential target company is
                 running its Web site in the cloud, the snooper could flood the
                 site with activity, prompting it to start up more virtual ma-
                 chines. The attacker would then create virtual machines at the

                 same time and have a good prospect of landing on the same
                 physical server, Tromer said.
                     One possible use for such a position would be to “listen to”
                 an idle virtual machine nearby in order to sense activity on the
                 server when it starts up. A small spike in activity might indicate
                 that a user was typing a password into the virtual machine’s ap-
                 plication. If keystrokes within the spike could be detected by



                                                                     155
   170   171   172   173   174   175   176   177   178   179   180