Sökning: id:"swepub:oai:DiVA.org:ri-51820" >
Securely launching ...
Securely launching virtual machines on trustworthy platforms in a public cloud : An enterprise's perspective
-
- Aslam, Mudassar, 1979- (författare)
- RISE,SICS,Swedish Institute of Computer Science, Kista
-
- Gehrmann, Christian (författare)
- RISE,SICS,Swedish Institute of Computer Science, Kista,Security Lab
-
- Rasmusson, Lars (författare)
- RISE,SICS,Swedish Institute of Computer Science, Kista,Computer Systems Laboratory
-
visa fler...
-
- Björkman, Mats (författare)
- Mälardalens högskola,Akademin för innovation, design och teknik
-
visa färre...
-
(creator_code:org_t)
- 2012
- 2012
- Engelska.
-
Ingår i: CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. - 9789898565051 ; , s. 511-521
- Relaterad länk:
-
http://closer.scitev...
-
visa fler...
-
https://ri.diva-port... (primary) (Raw object)
-
https://urn.kb.se/re...
-
https://urn.kb.se/re...
-
https://urn.kb.se/re...
-
visa färre...
Abstract
Ämnesord
Stäng
- In this paper we consider the Infrastructure-as-a-Service (IaaS) cloud model which allows cloud users to run their own virtual machines (VMs) on available cloud computing resources. IaaS gives enterprises the possibility to outsource their process workloads with minimal effort and expense. However, one major problem with existing approaches of cloud leasing, is that the users can only get contractual guarantees regarding the integrity of the offered platforms. The fact that the IaaS user himself or herself cannot verify the providerpromised cloud platform integrity, is a security risk which threatens to prevent the IaaS business in general. In this paper we address this issue and propose a novel secure VM launch protocol using Trusted Computing techniques. This protocol allows the cloud IaaS users to securely bind the VM to a trusted computer configuration such that the clear text VM only will run on a platform that has been booted into a trustworthy state. This capability builds user confidence and can serve as an important enabler for creating trust in public clouds. We evaluate the feasibility of our proposed protocol via a full scale system implementation and perform a system security analysis.
Ämnesord
- TEKNIK OCH TEKNOLOGIER -- Elektroteknik och elektronik (hsv//swe)
- ENGINEERING AND TECHNOLOGY -- Electrical Engineering, Electronic Engineering, Information Engineering (hsv//eng)
- NATURVETENSKAP -- Data- och informationsvetenskap (hsv//swe)
- NATURAL SCIENCES -- Computer and Information Sciences (hsv//eng)
Nyckelord
- Cloud computing
- IaaS
- Security
- Trusted computing
- Virtualization
- Clear text
- Cloud models
- Computer configuration
- Computing resource
- Full-scale system
- Outsource
- Platform integrity
- Security risks
- System security
- Virtual machines
- Virtualizations
- Computer simulation
- Industry
- Computer Science
Publikations- och innehållstyp
- ref (ämneskategori)
- kon (ämneskategori)
Hitta via bibliotek
Till lärosätets databas