SwePub
Sök i LIBRIS databas

  Utökad sökning

id:"swepub:oai:DiVA.org:ri-51820"
 

Sökning: id:"swepub:oai:DiVA.org:ri-51820" > Securely launching ...

Securely launching virtual machines on trustworthy platforms in a public cloud : An enterprise's perspective

Aslam, Mudassar, 1979- (författare)
RISE,SICS,Swedish Institute of Computer Science, Kista
Gehrmann, Christian (författare)
RISE,SICS,Swedish Institute of Computer Science, Kista,Security Lab
Rasmusson, Lars (författare)
RISE,SICS,Swedish Institute of Computer Science, Kista,Computer Systems Laboratory
visa fler...
Björkman, Mats (författare)
Mälardalens högskola,Akademin för innovation, design och teknik
visa färre...
 (creator_code:org_t)
2012
2012
Engelska.
Ingår i: CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. - 9789898565051 ; , s. 511-521
  • Konferensbidrag (refereegranskat)
Abstract Ämnesord
Stäng  
  • In this paper we consider the Infrastructure-as-a-Service (IaaS) cloud model which allows cloud users to run their own virtual machines (VMs) on available cloud computing resources. IaaS gives enterprises the possibility to outsource their process workloads with minimal effort and expense. However, one major problem with existing approaches of cloud leasing, is that the users can only get contractual guarantees regarding the integrity of the offered platforms. The fact that the IaaS user himself or herself cannot verify the providerpromised cloud platform integrity, is a security risk which threatens to prevent the IaaS business in general. In this paper we address this issue and propose a novel secure VM launch protocol using Trusted Computing techniques. This protocol allows the cloud IaaS users to securely bind the VM to a trusted computer configuration such that the clear text VM only will run on a platform that has been booted into a trustworthy state. This capability builds user confidence and can serve as an important enabler for creating trust in public clouds. We evaluate the feasibility of our proposed protocol via a full scale system implementation and perform a system security analysis.

Ämnesord

TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering (hsv//eng)
NATURVETENSKAP  -- Data- och informationsvetenskap (hsv//swe)
NATURAL SCIENCES  -- Computer and Information Sciences (hsv//eng)

Nyckelord

Cloud computing
IaaS
Security
Trusted computing
Virtualization
Clear text
Cloud models
Computer configuration
Computing resource
Full-scale system
Outsource
Platform integrity
Security risks
System security
Virtual machines
Virtualizations
Computer simulation
Industry
Computer Science

Publikations- och innehållstyp

ref (ämneskategori)
kon (ämneskategori)

Hitta via bibliotek

Till lärosätets databas

Sök utanför SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy