Skip to main content
Erschienen in:
Buchtitelbild

2014 | OriginalPaper | Buchkapitel

1. Towards a GPU Cloud: Benefits and Security Issues

verfasst von : Flavio Lombardi, Roberto Di Pietro

Erschienen in: Continued Rise of the Cloud

Verlag: Springer London

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Graphics processing unit (GPU)-based clouds are gaining momentum, and GPU computing resources are starting to be offered as a cloud service, either as parallel computing power or accessible as a part of a leased virtual machine (VM). For this reason, the GPU cloud is one of the most promising cloud evolutions. However, the present cloud offerings do not effectively exploit GPU computing resources, which could well improve the performance and security of distributed computing systems. In fact, heterogeneous many-core hardware and especially GPUs, offer a potentially massive increase in computing power. They are also very power efficient, enabling significant price/performance improvements over traditional central processing units (CPUs). Unfortunately, and more importantly, GPU clouds do not guarantee an adequate level of security with respect to access control and isolation. There is no effective control on how parallel code (a.k.a. kernels) is actually executed on a GPU. In fact, the present GPU device drivers are entirely based on proprietary code and are optimized for performance rather than security. As a result, GPU architectures and hardware (HW)/software (SW) implementations are not yet considered to be mature enough for a GPU cloud. In particular, the level of security offered by this novel approach has yet to be fully investigated, as there is a limited security-related research that specifically targets GPU architectures. This chapter describes how GPU-as-a-Service can be exposed to misuse and to potential denial of service (DoS) and information leakage. It also shows how GPUs can be used as a security and integrity monitoring tool by the cloud, for instance, to provide timely integrity checking of VM code and data, allowing scalable management of the security of complex cloud computing infrastructures. Some further relevant security concerns are discussed in this chapter, including GPU service availability, access transparency and control.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Agosta G, Barenghi A, Santis FD, Biagio AD, Pelosi G (2009) Fast disk encryption through GPGPU acceleration. In: Proceedings of the 2009 international conference on parallel and distributed computing, applications and technologies. Washington, DC, IEEE Computer Society, pp 102–109 Agosta G, Barenghi A, Santis FD, Biagio AD, Pelosi G (2009) Fast disk encryption through GPGPU acceleration. In: Proceedings of the 2009 international conference on parallel and distributed computing, applications and technologies. Washington, DC, IEEE Computer Society, pp 102–109
3.
Zurück zum Zitat Barenghi A, Pelosi G, Teglia Y (2011) Information leakage discovery techniques to enhance secure chip design. In: Ardagna C, Zhou J (eds) Information security theory and practice. Security and privacy of mobile devices in wireless communication, vol 6633. Springer, Berlin, pp 128–143CrossRef Barenghi A, Pelosi G, Teglia Y (2011) Information leakage discovery techniques to enhance secure chip design. In: Ardagna C, Zhou J (eds) Information security theory and practice. Security and privacy of mobile devices in wireless communication, vol 6633. Springer, Berlin, pp 128–143CrossRef
6.
7.
Zurück zum Zitat Das A, Memik G, Zambreno J, Choudhary A (2010) Detecting/preventing information leakage on the memory bus due to malicious hardware. In: Proceedings of the conference on design, automation and test in Europe. European Design and Automation Association, pp 861–866 Das A, Memik G, Zambreno J, Choudhary A (2010) Detecting/preventing information leakage on the memory bus due to malicious hardware. In: Proceedings of the conference on design, automation and test in Europe. European Design and Automation Association, pp 861–866
8.
Zurück zum Zitat Di Pietro R, Lombardi F, Villani A (2013) CUDA leaks: information leakage in GPU architectures. arXiv:1305.7383 Di Pietro R, Lombardi F, Villani A (2013) CUDA leaks: information leakage in GPU architectures. arXiv:1305.7383
9.
Zurück zum Zitat Feng W-C, Xiao S (2010) To GPU synchronize or not GPU synchronize? In: Proceedings of 2010 IEEE international symposium on circuits and systems (ISCAS), pp 3801–3804 Feng W-C, Xiao S (2010) To GPU synchronize or not GPU synchronize? In: Proceedings of 2010 IEEE international symposium on circuits and systems (ISCAS), pp 3801–3804
11.
Zurück zum Zitat Georgescu S, Chow P (2011) GPU accelerated CAE using open solvers and the cloud. SIGARCH Comput Archit News 39(4):14–19CrossRef Georgescu S, Chow P (2011) GPU accelerated CAE using open solvers and the cloud. SIGARCH Comput Archit News 39(4):14–19CrossRef
12.
Zurück zum Zitat Gorantla S, Kadloor S, Kiyavash N, Coleman T, Moskowitz IS, Kang MH (2012) Characterizing the efficacy of the (NRL) network pump in mitigating covert timing channels. Inf Forensics Secur IEEE Trans 7(1):64–75CrossRef Gorantla S, Kadloor S, Kiyavash N, Coleman T, Moskowitz IS, Kang MH (2012) Characterizing the efficacy of the (NRL) network pump in mitigating covert timing channels. Inf Forensics Secur IEEE Trans 7(1):64–75CrossRef
13.
Zurück zum Zitat Gupta S, Feng S, Ansari A, Mahlke S (2010) Erasing core boundaries for robust and configurable performance. In: 43rd annual IEEE/ACM international symposium on Microarchitecture (MICRO), Atlanta, Georgia, pp 325–336 Gupta S, Feng S, Ansari A, Mahlke S (2010) Erasing core boundaries for robust and configurable performance. In: 43rd annual IEEE/ACM international symposium on Microarchitecture (MICRO), Atlanta, Georgia, pp 325–336
14.
Zurück zum Zitat Kang MH, Moskowitz IS (1993) A pump for rapid, reliable, secure communication. In: Proceedings of the 1st ACM conference on computer and communication security, fairfax, 3–5 Nov 1993, pp 119–129 Kang MH, Moskowitz IS (1993) A pump for rapid, reliable, secure communication. In: Proceedings of the 1st ACM conference on computer and communication security, fairfax, 3–5 Nov 1993, pp 119–129
15.
Zurück zum Zitat Kanuparthi A, Zahran M, Karri R (2012) Architecture support for dynamic integrity checking. Inf Forensics Secur IEEE Trans 7(1):321–332CrossRef Kanuparthi A, Zahran M, Karri R (2012) Architecture support for dynamic integrity checking. Inf Forensics Secur IEEE Trans 7(1):321–332CrossRef
16.
Zurück zum Zitat Kato S, McThrow M, Maltzahn C, Brandt S (2012) Gdev: First-class GPU resource management in the operating system. In: Proceedings of the 2012 USENIX conference on Annual Technical Conference (USENIX ATC'12). USENIX Association, Berkeley, CA, USA, p 37 Kato S, McThrow M, Maltzahn C, Brandt S (2012) Gdev: First-class GPU resource management in the operating system. In: Proceedings of the 2012 USENIX conference on Annual Technical Conference (USENIX ATC'12). USENIX Association, Berkeley, CA, USA, p 37
17.
Zurück zum Zitat Kim J, Kim H, Lee JH, Lee J (2011) Achieving a single compute device image in OpenCL for multiple GPUs. In: Proceedings of the 16th ACM symposium on principles and practice of parallel programming. New York, NY, USA, ACM, pp 277–288 Kim J, Kim H, Lee JH, Lee J (2011) Achieving a single compute device image in OpenCL for multiple GPUs. In: Proceedings of the 16th ACM symposium on principles and practice of parallel programming. New York, NY, USA, ACM, pp 277–288
20.
Zurück zum Zitat Li Y, Zhao K, Chu X, Liu J (2010) Speeding up K-means algorithm by GPUs. In: 10th IEEE international conference on computer and information technology (CIT ’10), Bradford, UK Li Y, Zhao K, Chu X, Liu J (2010) Speeding up K-means algorithm by GPUs. In: 10th IEEE international conference on computer and information technology (CIT ’10), Bradford, UK
21.
Zurück zum Zitat Lombardi F, Di Pietro R (2009) KvmSec: a security extension for Linux kernel virtual machines. In: Proceedings of the 2009 ACM symposium on applied computing. New York, NY, USA, ACM, pp 2029–2034 Lombardi F, Di Pietro R (2009) KvmSec: a security extension for Linux kernel virtual machines. In: Proceedings of the 2009 ACM symposium on applied computing. New York, NY, USA, ACM, pp 2029–2034
22.
Zurück zum Zitat Lombardi F, Di Pietro R (2010) CUDACS: securing the cloud with CUDA-enabled secure virtualization. In: Proceedings of the 12th international conference on Information and communications security. Berlin, Heidelberg, Springer-Verlag, pp 92–106 Lombardi F, Di Pietro R (2010) CUDACS: securing the cloud with CUDA-enabled secure virtualization. In: Proceedings of the 12th international conference on Information and communications security. Berlin, Heidelberg, Springer-Verlag, pp 92–106
23.
Zurück zum Zitat Lombardi F, Di Pietro R (2011) Secure virtualization for cloud computing. J Netw Comput Appl 34(4):1113–1122CrossRef Lombardi F, Di Pietro R (2011) Secure virtualization for cloud computing. J Netw Comput Appl 34(4):1113–1122CrossRef
24.
Zurück zum Zitat Mei C, Jiang H, Jenness J (2010) CUDA-based AES parallelization with fine-tuned GPU memory utilization. In: 2010 IEEE international symposium on parallel distributed processing, workshops and Phd forum (IPDPSW), pp 1–7 Mei C, Jiang H, Jenness J (2010) CUDA-based AES parallelization with fine-tuned GPU memory utilization. In: 2010 IEEE international symposium on parallel distributed processing, workshops and Phd forum (IPDPSW), pp 1–7
25.
Zurück zum Zitat Menichelli F, Menicocci R, Olivieri M, Trifiletti A (2008) High-level side-channel attack modeling and simulation for security-critical systems on chips. IEEE Trans Dependable Secur Comput 5(3):164–176CrossRef Menichelli F, Menicocci R, Olivieri M, Trifiletti A (2008) High-level side-channel attack modeling and simulation for security-critical systems on chips. IEEE Trans Dependable Secur Comput 5(3):164–176CrossRef
26.
Zurück zum Zitat Mercuri RT, Neumann PG (2003) Security by obscurity. Commun ACM 46(11):160–166CrossRef Mercuri RT, Neumann PG (2003) Security by obscurity. Commun ACM 46(11):160–166CrossRef
29.
Zurück zum Zitat Osvik D, Shamir A, Tromer E (2006) Cache attacks and countermeasures: the case of AES. In: Pointcheval D (ed) Topics in cryptology CT-RSA 2006, vol 3860. Springer, Berlin, pp 1–20CrossRef Osvik D, Shamir A, Tromer E (2006) Cache attacks and countermeasures: the case of AES. In: Pointcheval D (ed) Topics in cryptology CT-RSA 2006, vol 3860. Springer, Berlin, pp 1–20CrossRef
30.
Zurück zum Zitat Oz I, Topcuoglu HR, Kandemir M, Tosun O (2012) Thread vulnerability in parallel applications. J Parallel Distrib Comput 72(10):1171–1185CrossRef Oz I, Topcuoglu HR, Kandemir M, Tosun O (2012) Thread vulnerability in parallel applications. J Parallel Distrib Comput 72(10):1171–1185CrossRef
32.
Zurück zum Zitat Pungila C, Negru V (2012). A highly-efficient memory-compression approach for GPU-accelerated virus signature matching. In: Gollmann D, Freiling FC (eds) Information security. Springer, Berlin, pp 354–369CrossRef Pungila C, Negru V (2012). A highly-efficient memory-compression approach for GPU-accelerated virus signature matching. In: Gollmann D, Freiling FC (eds) Information security. Springer, Berlin, pp 354–369CrossRef
33.
Zurück zum Zitat Rebeiro C, Mukhopadhay D (2012) Boosting profiled cache timing attacks with A priori analysis. Inf Forensics Secur IEEE Trans 7(6):1900–1905CrossRef Rebeiro C, Mukhopadhay D (2012) Boosting profiled cache timing attacks with A priori analysis. Inf Forensics Secur IEEE Trans 7(6):1900–1905CrossRef
34.
Zurück zum Zitat Ristenpart T (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute Clouds. In: Proceedings of the 16th ACM conference on computer and communications security, CCS ’09, New York, NY, pp 199–212 Ristenpart T (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute Clouds. In: Proceedings of the 16th ACM conference on computer and communications security, CCS ’09, New York, NY, pp 199–212
35.
Zurück zum Zitat Rossbach CJ, Currey J, Silberstein M, Ray B, Witchel E (2011) PTask: operating system abstractions to manage GPUs as compute devices. In: Proceedings of the twenty-third ACM symposium on operating systems principles. New York, NY, USA, ACM, pp 233–248 Rossbach CJ, Currey J, Silberstein M, Ray B, Witchel E (2011) PTask: operating system abstractions to manage GPUs as compute devices. In: Proceedings of the twenty-third ACM symposium on operating systems principles. New York, NY, USA, ACM, pp 233–248
36.
Zurück zum Zitat Sengupta D, Belapure R, Schwan K (2013) Multi-tenancy on GPGPU-based servers. In: Proceedings of the 7th international workshop on virtualization technologies in distributed computing. New York, NY, USA, ACM, pp 3–10 Sengupta D, Belapure R, Schwan K (2013) Multi-tenancy on GPGPU-based servers. In: Proceedings of the 7th international workshop on virtualization technologies in distributed computing. New York, NY, USA, ACM, pp 3–10
37.
Zurück zum Zitat Shye A, Blomstedt J, Moseley T, Reddi VJ, Connors DA (2009) PLR: a software approach to transient fault tolerance for multicore architectures. IEEE Trans Dependable Secur Comput 6(2):135–148CrossRef Shye A, Blomstedt J, Moseley T, Reddi VJ, Connors DA (2009) PLR: a software approach to transient fault tolerance for multicore architectures. IEEE Trans Dependable Secur Comput 6(2):135–148CrossRef
38.
Zurück zum Zitat Tsai T-C, Hsieh C-W, Chou C-Y, Cheng Y-F, Kuo S-H (2012) NCHC’s Formosa V GPU cluster enters the TOP500 ranking. In: Proceedings of the 2012 IEEE 4th international conference on cloud computing technology and science (CloudCom). Washington, DC, USA, IEEE Computer Society, pp 622–624 Tsai T-C, Hsieh C-W, Chou C-Y, Cheng Y-F, Kuo S-H (2012) NCHC’s Formosa V GPU cluster enters the TOP500 ranking. In: Proceedings of the 2012 IEEE 4th international conference on cloud computing technology and science (CloudCom). Washington, DC, USA, IEEE Computer Society, pp 622–624
39.
Zurück zum Zitat Wang Z, Wu C, Grace M, Jiang X (2012) Isolating commodity hosted hypervisors with HyperLock. In: Proceedings of the 7th ACM European conference on computer systems. New York, NY, USA, ACM, pp 127–140 Wang Z, Wu C, Grace M, Jiang X (2012) Isolating commodity hosted hypervisors with HyperLock. In: Proceedings of the 7th ACM European conference on computer systems. New York, NY, USA, ACM, pp 127–140
40.
Zurück zum Zitat Wong H, Papadopoulou M-M, Sadooghi-Alvandi M, Moshovos A (2010) Demystifying GPU microarchitecture through microbenchmarking. In: IEEE international symposium on performance analysis of systems software (ISPASS), pp 235–246 Wong H, Papadopoulou M-M, Sadooghi-Alvandi M, Moshovos A (2010) Demystifying GPU microarchitecture through microbenchmarking. In: IEEE international symposium on performance analysis of systems software (ISPASS), pp 235–246
41.
Zurück zum Zitat Wu J, Hong B (2011) An efficient k-means algorithm on CUDA. In: 25th IEEE international symposium on parallel and distributed processing workshops and PhD forum (IPDPSW ’11), Anchorage, Alaska, pp 1740–1749 Wu J, Hong B (2011) An efficient k-means algorithm on CUDA. In: 25th IEEE international symposium on parallel and distributed processing workshops and PhD forum (IPDPSW ’11), Anchorage, Alaska, pp 1740–1749
42.
Zurück zum Zitat Xu W, Zhang H, Jiao S, Wang D, Song F, Liu Z (2012) Optimizing sparse matrix vector multiplication using cache blocking method on Fermi GPU. In: Proceedings of the 2012 13th ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing. Washington, DC, USA, IEEE Computer Society, pp 231–235 Xu W, Zhang H, Jiao S, Wang D, Song F, Liu Z (2012) Optimizing sparse matrix vector multiplication using cache blocking method on Fermi GPU. In: Proceedings of the 2012 13th ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing. Washington, DC, USA, IEEE Computer Society, pp 231–235
43.
Zurück zum Zitat Yang X, Blackburn SM, Frampton D, Sartor JB, McKinley KS (2011) Why nothing matters: the impact of zeroing. SIGPLAN Not 46(10):307–324CrossRef Yang X, Blackburn SM, Frampton D, Sartor JB, McKinley KS (2011) Why nothing matters: the impact of zeroing. SIGPLAN Not 46(10):307–324CrossRef
44.
Zurück zum Zitat Yang Y, Xiang P, Kong J, Mantor M, Zhou H (2012) A unified optimizing compiler framework for different GPGPU architectures. ACM Trans Archit Code Optim 9(2):1–33CrossRefMATH Yang Y, Xiang P, Kong J, Mantor M, Zhou H (2012) A unified optimizing compiler framework for different GPGPU architectures. ACM Trans Archit Code Optim 9(2):1–33CrossRefMATH
Metadaten
Titel
Towards a GPU Cloud: Benefits and Security Issues
verfasst von
Flavio Lombardi
Roberto Di Pietro
Copyright-Jahr
2014
Verlag
Springer London
DOI
https://doi.org/10.1007/978-1-4471-6452-4_1