Investigation of power attack to data center

Due to the increased popularity of cloud computing services, there is a need to increase the amount of servers within the data centers. Thus, the rapid server deployment in data centers has caused their power distribution and cooling systems to approach peak capacity. However, it is very expensive t...

Full description

Saved in:
Bibliographic Details
Main Author: Koh, Kiat
Other Authors: Lu Rongxing
Format: Final Year Project
Language:English
Published: 2015
Subjects:
Online Access:http://hdl.handle.net/10356/64662
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-64662
record_format dspace
spelling sg-ntu-dr.10356-646622023-07-07T16:53:58Z Investigation of power attack to data center Koh, Kiat Lu Rongxing School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering Due to the increased popularity of cloud computing services, there is a need to increase the amount of servers within the data centers. Thus, the rapid server deployment in data centers has caused their power distribution and cooling systems to approach peak capacity. However, it is very expensive to upgrade the power infrastructures of data centers and the related cost is commonly in hundreds of millions of dollars. Thus, power oversubscription, whereby more servers are added to the current power systems capacity, is now commonly used as a method to defer the costly upgrades. This is based on the assumption that peak power consumption of the server racks do not peak simultaneously with normal workload. A previous study from Google also indicates that this assumption is valid. However, power oversubscription induces a hidden risk in which there is a possibility that power consumption of the servers will exceed the power system capacity, causing the circuit breakers to trip and lead to undesired power outages. This can be due to malicious workloads that can generate power spikes on servers at the same time. Such malicious workload can be defined as power attacks. The power outrage would bring about great financial loss to organizations due to data center downtime. Hence, there is a need to survey on existing power attacks on data centers and investigate possible approaches to mitigate the power attacks. In this paper, several power attack vectors are surveyed, namely eDDoS attacks, cache misses and insider attacks. To conduct these attacks, an adversary would need a huge network of cloud users or an insider. Thus, preventive measures using cryptography for authentication and access control measures which include the use of honeywords and Shamir’s secret sharing scheme is discussed. In this paper, a new (2, 3) secret sharing scheme is proposed in which shares are periodically updated to prevent adversaries from using old shares from a previously compromised server. The properties of this proposed scheme is then analysed. Bachelor of Engineering 2015-05-29T03:26:46Z 2015-05-29T03:26:46Z 2015 2015 Final Year Project (FYP) http://hdl.handle.net/10356/64662 en Nanyang Technological University 54 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering
spellingShingle DRNTU::Engineering::Electrical and electronic engineering
Koh, Kiat
Investigation of power attack to data center
description Due to the increased popularity of cloud computing services, there is a need to increase the amount of servers within the data centers. Thus, the rapid server deployment in data centers has caused their power distribution and cooling systems to approach peak capacity. However, it is very expensive to upgrade the power infrastructures of data centers and the related cost is commonly in hundreds of millions of dollars. Thus, power oversubscription, whereby more servers are added to the current power systems capacity, is now commonly used as a method to defer the costly upgrades. This is based on the assumption that peak power consumption of the server racks do not peak simultaneously with normal workload. A previous study from Google also indicates that this assumption is valid. However, power oversubscription induces a hidden risk in which there is a possibility that power consumption of the servers will exceed the power system capacity, causing the circuit breakers to trip and lead to undesired power outages. This can be due to malicious workloads that can generate power spikes on servers at the same time. Such malicious workload can be defined as power attacks. The power outrage would bring about great financial loss to organizations due to data center downtime. Hence, there is a need to survey on existing power attacks on data centers and investigate possible approaches to mitigate the power attacks. In this paper, several power attack vectors are surveyed, namely eDDoS attacks, cache misses and insider attacks. To conduct these attacks, an adversary would need a huge network of cloud users or an insider. Thus, preventive measures using cryptography for authentication and access control measures which include the use of honeywords and Shamir’s secret sharing scheme is discussed. In this paper, a new (2, 3) secret sharing scheme is proposed in which shares are periodically updated to prevent adversaries from using old shares from a previously compromised server. The properties of this proposed scheme is then analysed.
author2 Lu Rongxing
author_facet Lu Rongxing
Koh, Kiat
format Final Year Project
author Koh, Kiat
author_sort Koh, Kiat
title Investigation of power attack to data center
title_short Investigation of power attack to data center
title_full Investigation of power attack to data center
title_fullStr Investigation of power attack to data center
title_full_unstemmed Investigation of power attack to data center
title_sort investigation of power attack to data center
publishDate 2015
url http://hdl.handle.net/10356/64662
_version_ 1772828246265561088