Investigation of power attack to data center
Due to the increased popularity of cloud computing services, there is a need to increase the amount of servers within the data centers. Thus, the rapid server deployment in data centers has caused their power distribution and cooling systems to approach peak capacity. However, it is very expensive t...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2015
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/64662 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-64662 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-646622023-07-07T16:53:58Z Investigation of power attack to data center Koh, Kiat Lu Rongxing School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering Due to the increased popularity of cloud computing services, there is a need to increase the amount of servers within the data centers. Thus, the rapid server deployment in data centers has caused their power distribution and cooling systems to approach peak capacity. However, it is very expensive to upgrade the power infrastructures of data centers and the related cost is commonly in hundreds of millions of dollars. Thus, power oversubscription, whereby more servers are added to the current power systems capacity, is now commonly used as a method to defer the costly upgrades. This is based on the assumption that peak power consumption of the server racks do not peak simultaneously with normal workload. A previous study from Google also indicates that this assumption is valid. However, power oversubscription induces a hidden risk in which there is a possibility that power consumption of the servers will exceed the power system capacity, causing the circuit breakers to trip and lead to undesired power outages. This can be due to malicious workloads that can generate power spikes on servers at the same time. Such malicious workload can be defined as power attacks. The power outrage would bring about great financial loss to organizations due to data center downtime. Hence, there is a need to survey on existing power attacks on data centers and investigate possible approaches to mitigate the power attacks. In this paper, several power attack vectors are surveyed, namely eDDoS attacks, cache misses and insider attacks. To conduct these attacks, an adversary would need a huge network of cloud users or an insider. Thus, preventive measures using cryptography for authentication and access control measures which include the use of honeywords and Shamir’s secret sharing scheme is discussed. In this paper, a new (2, 3) secret sharing scheme is proposed in which shares are periodically updated to prevent adversaries from using old shares from a previously compromised server. The properties of this proposed scheme is then analysed. Bachelor of Engineering 2015-05-29T03:26:46Z 2015-05-29T03:26:46Z 2015 2015 Final Year Project (FYP) http://hdl.handle.net/10356/64662 en Nanyang Technological University 54 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Electrical and electronic engineering |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering Koh, Kiat Investigation of power attack to data center |
description |
Due to the increased popularity of cloud computing services, there is a need to increase the amount of servers within the data centers. Thus, the rapid server deployment in data centers has caused their power distribution and cooling systems to approach peak capacity. However, it is very expensive to upgrade the power infrastructures of data centers and the related cost is commonly in hundreds of millions of dollars. Thus, power oversubscription, whereby more servers are added to the current power systems capacity, is now commonly used as a method to defer the costly upgrades. This is based on the assumption that peak power consumption of the server racks do not peak simultaneously with normal workload. A previous study from Google also indicates that this assumption is valid. However, power oversubscription induces a hidden risk in which there is a possibility that power consumption of the servers will exceed the power system capacity, causing the circuit breakers to trip and lead to undesired power outages. This can be due to malicious workloads that can generate power spikes on servers at the same time. Such malicious workload can be defined as power attacks. The power outrage would bring about great financial loss to organizations due to data center downtime. Hence, there is a need to survey on existing power attacks on data centers and investigate possible approaches to mitigate the power attacks. In this paper, several power attack vectors are surveyed, namely eDDoS attacks, cache misses and insider attacks. To conduct these attacks, an adversary would need a huge network of cloud users or an insider. Thus, preventive measures using cryptography for authentication and access control measures which include the use of honeywords and Shamir’s secret sharing scheme is discussed. In this paper, a new (2, 3) secret sharing scheme is proposed in which shares are periodically updated to prevent adversaries from using old shares from a previously compromised server. The properties of this proposed scheme is then analysed. |
author2 |
Lu Rongxing |
author_facet |
Lu Rongxing Koh, Kiat |
format |
Final Year Project |
author |
Koh, Kiat |
author_sort |
Koh, Kiat |
title |
Investigation of power attack to data center |
title_short |
Investigation of power attack to data center |
title_full |
Investigation of power attack to data center |
title_fullStr |
Investigation of power attack to data center |
title_full_unstemmed |
Investigation of power attack to data center |
title_sort |
investigation of power attack to data center |
publishDate |
2015 |
url |
http://hdl.handle.net/10356/64662 |
_version_ |
1772828246265561088 |