ֱ̽ of Cambridge - cloud computing /taxonomy/subjects/cloud-computing en Aim policies at ‘hardware’ to ensure AI safety, say experts /stories/hardware-ai-safety <div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Chips and datacentres – the “compute” driving the AI revolution – may be the most effective targets for risk-reducing AI policies, according to a new report.</p> </p></div></div></div> Wed, 14 Feb 2024 11:28:30 +0000 fpjl2 244461 at Making operating systems safer and faster with ‘unikernels’ /research/news/making-operating-systems-safer-and-faster-with-unikernels <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/photo-1421081177127-339f586c9b49.png?itok=8rA8hlJi" alt="" title="Credit: None" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Specialised computer software components to improve the security, speed and scale of data processing in cloud computing are being developed by a ֱ̽ of Cambridge spin-out company. ֱ̽company, Unikernel Systems, which was formed by staff and postdoctoral researchers at the ֱ̽ Computer Laboratory, has recently been acquired by San-Francisco based software company Docker Inc.</p>&#13; &#13; <p>Unikernels are small, potentially transient computer modules specialised to undertake a single task at the point in time when it is needed. Because of their reduced size, they are far more secure than traditional operating systems, and can be started up and shut down quickly and cheaply, providing flexibility and further security.</p>&#13; &#13; <p>They are likely to become increasingly used in applications where security and efficiency are vital, such as systems storing personal data and applications for the so-called Internet of Things (IoT) – internet-connected appliances and consumer products.</p>&#13; &#13; <p>“Unikernels provide the means to run the same application code on radically different environments from the public cloud to IoT devices,” said Dr Richard Mortier of the Computer Laboratory, one of the company’s advisors. “This allows decisions about where to run things to be revisited in the light of experience - providing greater flexibility and resilience. It also means software on those IoT devices is going to be a lot more reliable."</p>&#13; &#13; <p>Recent years have seen a huge increase in the amount of data that is collected, stored and processed, a trend that will only continue as increasing numbers of devices are connected to the internet. Most commercial data storage and processing now takes place within huge datacentres run by specialist providers, rather than on individual machines and company servers; the individual elements of this system are obscured to end users within the ‘cloud’. One of the technologies that has been instrumental in making this happen is virtual machines.</p>&#13; &#13; <p>Normally, a virtual machine (VM) runs just like a real computer, with its own virtual operating system – just as your desktop computer might run Windows. However, a single real machine can run many VMs concurrently. VMs are general purpose, able to handle a wide range of jobs from different types of user, and capable of being moved across real machines within datacentres in response to overall user demand. ֱ̽ ֱ̽’s Computer Laboratory started research on virtualisation in 1999, and the Xen virtual machine monitor that resulted now provides the basis for much of the present-day cloud.</p>&#13; &#13; <p>Although VMs have driven the development of the cloud (and greatly reduced energy consumption), their inherent flexibility can come at a cost if their virtual operating systems are the generic Linux or Windows systems. These operating systems are large and complex, they have significant memory footprints, and they take time to start up each time they are required. Security is also an issue, because of their relatively large ‘attack surface’.</p>&#13; &#13; <p>Given that many VMs are actually used to undertake a single function, (e.g. acting as a company database), recent research has shifted to minimising complexity and improving security by taking advantage of the narrow functionality. And this is where unikernels come in.</p>&#13; &#13; <p>Researchers at the Computer Laboratory started restructuring VMs into flexible modular components in 2009, as part of the RCUK-funded <a href="https://mirage.io/">MirageOS project</a>. These specialised modules – or <a href="http://unikernel.org/">unikernels</a> - are in effect the opposite of generic VMs. Each one is designed to undertake a single task; they are small, simple and quick, using just enough code to enable the relevant application or process to run (about 4% of a traditional operating system according to one <a href="https://zpbnef1975.org/blacked/aziatki/">estimate</a>).</p>&#13; &#13; <p> ֱ̽small size of unikernels also lends considerable security advantages, as they present a much smaller ‘surface’ to malicious attack, and also enable companies to separate out different data processing tasks in order to limit the effects of any security breach that does occur. Given that resource use within the cloud is metered and charged, they also provide considerable cost savings to end users.</p>&#13; &#13; <p>By the end of last year, the unikernel technology arising from MirageOS was sufficiently advanced that the team, led by Dr. Anil Madhavapeddy, decided to found a start-up company. ֱ̽company, <a href="http://unikernel.com/">Unikernel Systems</a>, was recently acquired by San Francisco-based Docker Inc. to accelerate the development and broad adoption of the technology, now envisaged as a critical element in the future of the Internet of Things.</p>&#13; &#13; <p>“This brings together one of the most significant developments in operating systems technology of recent years, with one of the most dynamic startups that has already revolutionised the way we use cloud computing. This link-up will truly allow us all to “rethink cloud infrastructure”, said Balraj Singh, co-founder and CEO of Unikernel Systems.</p>&#13; &#13; <p>“This acquisition shows that the Computer Laboratory continues to produce innovations that find their way into mainstream developments. It also shows the power of open source development to have impact and to be commercially successful”, said Professor Andy Hopper, Head of the ֱ̽ of Cambridge Computer Laboratory.</p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Technology to improve the security, speed and scale of data processing in age of the Internet of Things is being developed by a Cambridge spin-out company.</p>&#13; </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">This acquisition shows the power of open source development to have impact and to be commercially successful.</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Andy Hopper</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br />&#13; ֱ̽text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/" rel="license">Creative Commons Attribution 4.0 International License</a>. For image use please see separate credits above.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Thu, 28 Jan 2016 08:00:00 +0000 sc604 166132 at How can we protect our information in the era of cloud computing? /research/news/how-can-we-protect-our-information-in-the-era-of-cloud-computing <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/image.jpg?itok=rG6wnSFj" alt="Privacy" title="Privacy, Credit: g4ll4is" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>In an <a href="https://rspa.royalsocietypublishing.org/content/471/2175/20140862" target="_blank">article</a> published in the <em>Proceedings of the Royal Society A</em>, Professor Jon Crowcroft argues that by parcelling and spreading data across multiple sites, and weaving it together like a tapestry, not only would our information be safer, it would be quicker to access, and could potentially be stored at lower overall cost.</p>&#13; &#13; <p> ֱ̽internet is a vast, decentralised communications system, with minimal administrative or governmental oversight. However, we increasingly access our information through cloud-based services, such as Google Drive, iCloud and Dropbox, which are very large centralised storage and processing systems. Cloud-based services offer convenience to the user, as their data can be accessed from anywhere with an internet connection, but their centralised nature can make them vulnerable to attack, such as when personal photos of mostly young and female celebrities were leaked last summer after their iCloud accounts were hacked.</p>&#13; &#13; <p>Storing information in the cloud makes it easily accessible to users, while removing the burden of managing it; and the cloud’s highly centralised nature keeps costs low for the companies providing the storage. However, centralised systems can lack resilience, meaning that service can be lost when any one part of the network access path fails.</p>&#13; &#13; <p>Centralised systems also give a specific point to attack for those who may want to access them illegally. Even if data is copied many times, if all the copies have the same flaw, they are all vulnerable. Just as a small gene pool places a population at risk from a change in the environment, such as a disease, the lack of variety in centralised storage systems places information at greater risk of theft.</p>&#13; &#13; <p> ֱ̽alternative is a decentralised system, also known as a peer-to-peer system, where resources from many potential locations in the network are mixed, rather than putting all one’s eggs in one basket.</p>&#13; &#13; <p> ֱ̽strength of a peer-to-peer system is that its value grows as the number of users increases: all producers are also potential consumers, so each added node gives the new producer as many customers as are already on the network.</p>&#13; &#13; <p>“Since all the members of a peer-to-peer network are giving as well as consuming resources, it quickly overtakes a centralised network in terms of its strength,” said Crowcroft, of the ֱ̽’s Computer Laboratory.</p>&#13; &#13; <p> ֱ̽higher reliability and performance of fibre to the home, the availability of 4G networks, and IPv6 (Internet Protocol version 6) are all helping to make decentralised networks viable. In practice, a user would carry most of the data they need to access immediately with them on their mobile device, with their home computer acting as the ‘master’ point of contact.</p>&#13; &#13; <p>“Essentially, data is encoded redundantly, but rather than making many copies, we weave a tapestry using the bits that represent data, so that threads making up particular pieces of information are repeated but meshed together with threads making up different pieces of information,” said Crowcroft. “Then to dis-entangle a particular piece of information, we need to unpick several threads.”</p>&#13; &#13; <p>Varying the ways that our information is stored or distributed is normally done to protect against faults in the network, but it can also improve the privacy of our data. In a decentralised system where data is partitioned across several sites, any attacker attempting to access that data has a much more complex target – the attacker has to know where all bits of the information are, as opposed to using brute force at one point to access everything. “ ֱ̽more diversity we use in a peer-to-peer system, the closer we get to an ideal in terms of resilience and privacy,” said Crowcroft.</p>&#13; &#13; <p>A peer-to-peer system could also be built at a lower overall cost than a centralised system, argues Crowcroft, since no ‘cache’ is needed in order to store data near the user. To the end user, costs could be as low as a pound per month, or even free, much lower than monthly internet access costs or mobile tariffs.</p>&#13; &#13; <p>“We haven’t seen massive take-up of decentralised networks yet, but perhaps that’s just premature,” said Crowcroft. “We’ve only had these massive centralised systems for about a decade, and like many other utilities, the internet will most likely move away from centralisation and towards decentralisation over time, especially as developments in technology make these systems attractive for customers.”</p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Private information would be much more secure if individuals moved away from cloud-based storage towards peer-to-peer systems, where data is stored in a variety of ways and across a variety of sites, argues a ֱ̽ of Cambridge researcher.</p>&#13; </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"> ֱ̽more diversity we use in a peer-to-peer system, the closer we get to an ideal in terms of resilience and privacy</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Jon Crowcroft</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="https://www.flickr.com/photos/g4ll4is/8521624548/in/photolist-dZ2y6b-7fNVzm-azTdMo-4EvWY9-dcv4yD-8b15Y2-edvyKx-8i9dVE-822bu2-axwagd-5qG9YV-9qR8HQ-gyXnY-4jkHD-o3MtjS-gtBMth-7notDM-eARcff-873F1R-9uCVmE-9i7ZK2-dRuMzt-Em1Z9-k2Nuaa-48ybNM-66r3T6-889TVV-5E5ZAK-9yfeKE-ddpg14-eTrqcD-pgokPc-iCz9t-6wCshe-a9eGCW-pDmshR-ahk6nh-9Mcwzt-46PRKe-bBguPn-5V3xR3-aHKoc-4WrJkA-7qxzPp-4kMWij-k2jus-7nzT7w-qmKn1-mXs67q-bak5nz" target="_blank">g4ll4is</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Privacy</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p> ֱ̽text in this work is licensed under a <a href="http://creativecommons.org/licenses/by-nc-sa/3.0/">Creative Commons Licence</a>. If you use this content on your site please link back to this page. For image rights, please see the credits associated with each individual image.</p>&#13; &#13; <p><a href="http://creativecommons.org/licenses/by-nc-sa/3.0/"><img alt="" src="/sites/www.cam.ac.uk/files/80x15.png" style="width: 80px; height: 15px;" /></a></p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div><div class="field field-name-field-license-type field-type-taxonomy-term-reference field-label-above"><div class="field-label">Licence type:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/imagecredit/attribution-sharealike">Attribution-ShareAlike</a></div></div></div> Mon, 26 Jan 2015 06:07:03 +0000 sc604 143792 at