TY - CHAP
T1 - Ensuring green computing in reconfigurable hardware based cloud platforms from hardware trojan attacks
AU - Guha, Krishnendu
AU - Majumder, Atanu
AU - Saha, Debasri
AU - Chakrabarti, Amlan
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/11/16
Y1 - 2020/11/16
N2 - Deployment of reconfigurable hardware or field programmable gate arrays (FPGAs) in cloud platforms is the modern trend. Practical scenarios include Amazon's EC2 F1 cloud services, Microsoft's Project Catapult and many others. Efficient task scheduling algorithms exist that can ensure green computing, i.e. order the operation of user tasks in the available FPGAs in such a manner that the power dissipated is optimum. But recent literature has exhibited eradication of the hardware root of trust, which is not taken into account by the existing task scheduling algorithms that can facilitate green computing. In this work, we analyze how vulnerability in hardware like hardware trojan horses (HTH) can increment power dissipation suddenly at runtime, without affecting the basic security primitives like integrity, confidentiality or availability of the system. Thus, are difficult to detect but may hamper the system due to unnecessary high power dissipation. We also develop a suitable runtime task scheduling algorithm which schedules the tasks at runtime based on the dynamic status of the resources, such that the power dissipation incurred at runtime is optimum. Finally, we also propose a mechanism via which we can detect affected cloud resources based on the runtime operations. We validate our proposed methodology via simulation based experiments.
AB - Deployment of reconfigurable hardware or field programmable gate arrays (FPGAs) in cloud platforms is the modern trend. Practical scenarios include Amazon's EC2 F1 cloud services, Microsoft's Project Catapult and many others. Efficient task scheduling algorithms exist that can ensure green computing, i.e. order the operation of user tasks in the available FPGAs in such a manner that the power dissipated is optimum. But recent literature has exhibited eradication of the hardware root of trust, which is not taken into account by the existing task scheduling algorithms that can facilitate green computing. In this work, we analyze how vulnerability in hardware like hardware trojan horses (HTH) can increment power dissipation suddenly at runtime, without affecting the basic security primitives like integrity, confidentiality or availability of the system. Thus, are difficult to detect but may hamper the system due to unnecessary high power dissipation. We also develop a suitable runtime task scheduling algorithm which schedules the tasks at runtime based on the dynamic status of the resources, such that the power dissipation incurred at runtime is optimum. Finally, we also propose a mechanism via which we can detect affected cloud resources based on the runtime operations. We validate our proposed methodology via simulation based experiments.
UR - https://www.scopus.com/pages/publications/85098984055
U2 - 10.1109/TENCON50793.2020.9293796
DO - 10.1109/TENCON50793.2020.9293796
M3 - Chapter
AN - SCOPUS:85098984055
T3 - IEEE Region 10 Annual International Conference, Proceedings/TENCON
SP - 1380
EP - 1385
BT - 2020 IEEE Region 10 Conference, TENCON 2020
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2020 IEEE Region 10 Conference, TENCON 2020
Y2 - 16 November 2020 through 19 November 2020
ER -