16
Security: systems, clouds, models, and privacy challenges iDASH Symposium http://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey Fox [email protected] http://www.infomall.org http://www.futuregrid.org Director, Digital Science Center, Pervasive Technology Institute Associate Dean for Research and Graduate Studies, School of Informatics and Computing

Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

Embed Size (px)

Citation preview

Page 1: Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

Security: systems, clouds, models, and privacy

challenges

iDASH Symposium http://idash.ucsd.eduSan Diego CA October 10-11 2011

Geoffrey [email protected]

http://www.infomall.org http://www.futuregrid.org

Director, Digital Science Center, Pervasive Technology Institute

Associate Dean for Research and Graduate Studies,  School of Informatics and Computing

Indiana University Bloomington

Page 2: Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

Philosophy of Clouds and Grids

• Clouds are (by definition) commercially supported approach to large scale computing (data-sets)– So we should expect Clouds to continue to replace Compute Grids– Current Grid technology involves “non-commercial” software solutions

which are hard to evolve/sustain

• Public Clouds are broadly accessible resources like Amazon and Microsoft Azure – powerful but not easy to customize and data trust/privacy issues

• Private Clouds run similar software and mechanisms but on “your own computers” (not clear if still elastic)– Platform features such as Queues, Tables, Databases currently limited– Still shared for cost effectiveness?

• Services still are correct architecture with either REST (Web 2.0) or Web Services

• Clusters are still critical concept for either MPI or Cloud software

Page 3: Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

2 Aspects of Cloud Computing: Infrastructure and Runtimes

• Cloud infrastructure: outsourcing of servers, computing, data, file space, utility computing, etc.– Handled through Web services that control virtual machine

lifecycles.• Cloud runtimes or Platform: tools (for using clouds) to do data-

parallel (and other) computations. – Apache Hadoop, Google MapReduce, Microsoft Dryad, Bigtable,

Chubby and others – MapReduce designed for information retrieval but is excellent for

a wide range of science data analysis applications– Can also do much traditional parallel computing for data-mining

if extended to support iterative operations– Data Parallel File system as in HDFS and Bigtable

Page 4: Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

Biomedical Cloud Issues• Operating cost of a large shared (public) cloud ~20% that of

traditional cluster• Gene sequencing cost decreasing much faster than Moore’s law• Biomedical computing does not need low latency (microsecond)

synchronization of HPC Cluster– Amazon a factor of 6 less effective on HPC workloads than state of art

HPC cluster– i.e. Clouds work for biomedical applications if we can make

convenient and address privacy and trust• Deduce natural infrastructure for biomedical data analysis is

cloud plus (iterative) MapReduce• Software as a Service likely to be dominant usage model

– Paid by “credit card” whether commercial, government or academic– “standard” services like BLAST plus services with your software

Page 5: Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

What is Modern Data System Architecture I?

• Traditionally each new instrument or major project has a new data center established– e.g. in Astronomy each wavelength has its data center

• Such centers offer– Data access with low level FTP/Web interface OR– Database access or other sophisticated search (e.g. GIS)

• No agreement across fields if significant computing needed on data– Life Sciences tend to need substantial computing from assembly,

alignment, clustering, ….• “Old model” was scientist downloading data for analysis in

local computer system– Is this realistic with multi-petabyte datasets?– Maybe with Content Delivery Network (Caching)

Page 6: Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

What is Modern Data System Architecture II?

• We are taught to “bring the computing to the data” but– Downloading data from central repository violates this

• Could have a giant cloud with a co-located giant data store but not very plausible politically or technically

• More likely multiple distributed 1-10 petabyte data archives with associated cloud (MapReduce) infrastructure– Analyses could still involve data and computing from multiple such

environments– Need hierarchical algorithms but usually natural

• These can be private or public clouds• For cost reasons, they will always be multi-user

shared systems but can be ~single function

Page 7: Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

Trustworthy Cloud Computing• Public Clouds are elastic (can be scaled up and down) as large

and shared– Sharing implies privacy and security concerns; need to learn how to

use shared facilities• Private clouds are not easy to make elastic or cost effective (as

too small)– Need to support public (aka shared) and private clouds

• “Amazon is 100X more secure than your infrastructure” (Bio-IT Boston April 2011)– But how do we establish this trust?

• “Amazon is more or less useless as NIH will only let us run 20% of our genomic data on it so not worth the effort to port software to cloud” (Bio-IT Boston)– Need to establish trust

Page 8: Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

Inside Modern Data System Architecture III?

• Even within our cloud, we can examine data architecture with ~3 major choices1) Shared file system (Lustre, GPFS, NFS …) as used to support high

performance computing2) Object Store such as S3(Amazon) or Swift (OpenStack)3) Data Parallel File Systems such as Hadoop or Google File Systems

• Shared File or Object Stores separate computing and data and are limited by bandwidth of compute cluster to storage system connection– Intra cluster bandwidth >> inter cluster bandwidth?

• Data Parallel File Systems canNOT put computing on same NODE as data in a multi-user environment– Can put data on same CLUSTER as computing

Page 9: Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

SData

SData

SData

SDataArchive

Storage Nodes

Compute Clusters

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

C

DataData

DataData

DataData

Data

Storage System

Traditional 3-level File System?

Page 10: Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

Data Parallel File System?

• No archival storage and computing brought to data

CData

CData

CData

CData

CData

CData

CData

CData

CData

CData

CData

CData

CData

CData

CData

CData

File1

Block1

Block2

BlockN

……Breakup Replicate each block

File1

Block1

Block2

BlockN

……Breakup

Replicate each block

Page 11: Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

Trustworthy Cloud Approaches• Rich access control with roles and sensitivity to combined

datasets • Anonymization & Differential Privacy – defend against

sophisticated datamining and establish trust that it can• Secure environments (systems) such as Amazon Virtual

Private Cloud – defend against sophisticated attacks and establish trust that it can

• Application specific approaches such as database privacy• Hierarchical algorithms where sensitive computations

need modest computing on non-shared resources• Iterative MapReduce can be built on classic pub-sub

communication software with known security approaches

Page 12: Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

Twister v0.9March 15, 2011

New Interfaces for Iterative MapReduce Programminghttp://www.iterativemapreduce.org/

SALSA Group

Bingjing Zhang, Yang Ruan, Tak-Lon Wu, Judy Qiu, Adam Hughes, Geoffrey Fox, Applying Twister to Scientific Applications, Proceedings of IEEE CloudCom 2010 Conference, Indianapolis, November 30-December 3, 2010

Twister4Azure to be released May 2011MapReduceRoles4Azure available now at http://salsahpc.indiana.edu/mapreduceroles4azure/

Page 13: Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

Twister4Azure Architecture

Azure BLOB Storage

MW1 MW2 MW3 MWm

RW1 RW2

Azure BLOB Storage

Intermediate Data

(through BLOB storage)

Reduce Task Int. Data Transfer

Table

Meta-Data on intermediate data products

Map Workers

Reduce Workers

Mn . . Mx . . M3 M2 M1

Map Task Queue

Rk . . Ry . . R3 R2 R1

Reduce Task Queue

Client APICommand Line

or Web UI

Map Task Meta-Data Table

Reduce Task Meta-Data Table

Map Task input Data

Page 14: Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

Performance Comparisons

0.00%

10.00%

20.00%

30.00%

40.00%

50.00%

60.00%

70.00%

80.00%

90.00%

100.00%

128 228 328 428 528 628 728

Para

llel E

ffici

ency

Number of Query Files

Twister4Azure

Hadoop-Blast

DryadLINQ-Blast

BLAST Sequence Search

50%55%60%65%70%75%80%85%90%95%

100%

Par

alle

l Effi

cie

ncy

Num. of Cores * Num. of Files

Twister4Azure

Amazon EMR

Apache Hadoop

Cap3 Sequence Assembly0

500

1000

1500

2000

2500

3000

Adjus

ted Tim

e (s)

Num. of Cores * Num. of Blocks

Twister4Azure

Amazon EMR

Apache Hadoop

Smith Waterman Sequence Alignment

Page 15: Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

https://portal.futuregrid.org

Multidimensional Scaling MDS Performance

5 10 15 200

100

200

300

400

500

600

700

Execution Time

Number of Iterations

5 10 15 2020

25

30

35

40

45

Time Per Iteration

Number of Iterations

30,000*30,000 Data points, 15 instances, 3 MR steps per iteration 30 Map tasks per application

# Instances

Speedup

6 6

12 16.4

24 35.3

48 52.8

Probably super linear as used small instances

Page 16: Security: systems, clouds, models, and privacy challenges iDASH Symposium ://idash.ucsd.edu San Diego CA October 10-11 2011 Geoffrey

100,043 Metagenomics Sequences Scaling to 10’s of millions with Twister on cloud