Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo

 

Unsupported browser: Your browser does not meet modern web standards. See how it scores »

{ action.text }

Leading cloud-computing services may be vulnerable to eavesdropping and malicious attacks, according to research that shows it is possible for attackers to precisely map where a target’s data is physically within the “cloud” and then use various tricks to gather intelligence.

The study probed Amazon’s industry-leading Elastic Computer Cloud (EC2) service, but “we firmly believe these vulnerabilities are generic to current virtualization technology and will affect other providers as well,” says Eran Tromer, a postdoctoral researcher at MIT’s Computer Science and Artificial Intelligence Laboratory, who performed the work with three colleagues from the University of California at San Diego.

Ron Rivest, a computer science professor at MIT and pioneer in cryptography, says the four researchers have “discovered some troubling facts” about cloud-computing services, which rent out computing resources, including storage and processing power, on a by-the-hour basis. Specifically, the potential weaknesses were found in the basic computing infrastructure services that are provided by Amazon and Rackspace and are widely used within many in-house corporate datacenters.

These technologies involve “virtual machines”–remote versions of traditional onsite computer systems, including the hardware and operating system. The number of these virtual machines can be expanded or contracted on the fly to meet demand, creating tremendous efficiencies. But the actual computing is, of course, performed within one or more physical data centers, each containing thousands of computers. And virtual machines of different customers sit on the same physical servers.

The attack involves first figuring out which physical servers a victim is using within a cloud, then implanting a malicious virtual machine there, and finally attacking the victim.

Hunting down a victim who might be on any of tens of thousands of servers might seem a needle-in-haystack enterprise. But the paper concludes that with some simple detective work, “just a few dollars invested in launching [virtual machines] can produce a 40 percent chance of placing a malicious [virtual machine] on the same physical server as a target.” They dub this mapping process “cartography.”

Tromer and his colleagues demonstrated that, once the malicious virtual machine is placed on the same server as its target, it is possible to carefully monitor how access to resources fluctuates and thereby potentially glean sensitive information about the victim. The researchers said it would be possible to steal data this way, though they did not take this next step.

The attack starts by taking advantage of that fact that all “virtual machines” still have internet protocol, or IP, addresses, visible to anyone within the cloud. The researchers found that nearby addresses often share the same hardware on EC2. So, at the simplest level, an attacker can set up lots of his own virtual machines, look at their IP addresses, and figure out which one shares the same physical resources as an intended target.

In practice, though, achieving this co-residence is not so easy; the attacker has a much higher chance of success if he has created his virtual machines at nearly the same time as his victim. To achieve such timing, the paper says, an attacker could perhaps flood the victim’s website with requests, forcing the victim to expand his computing capacity by creating new virtual machines. The attacker would then create new virtual machines at the same time and check the IP addresses to confirm that he had landed in the right spots.

2 comments. Share your thoughts »

Tagged: Computing, security, cloud computing, Amazon, network analysis, virtualization

Reprints and Permissions | Send feedback to the editor

From the Archives

Close

Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me