Search: onr:"swepub:oai:DiVA.org:ri-51820" >
Securely launching ...
Securely launching virtual machines on trustworthy platforms in a public cloud : An enterprise's perspective
-
- Aslam, Mudassar, 1979- (author)
- RISE,SICS,Swedish Institute of Computer Science, Kista
-
- Gehrmann, Christian (author)
- RISE,SICS,Swedish Institute of Computer Science, Kista,Security Lab
-
- Rasmusson, Lars (author)
- RISE,SICS,Swedish Institute of Computer Science, Kista,Computer Systems Laboratory
-
show more...
-
- Björkman, Mats (author)
- Mälardalens högskola,Akademin för innovation, design och teknik
-
show less...
-
(creator_code:org_t)
- 2012
- 2012
- English.
-
In: CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. - 9789898565051 ; , s. 511-521
- Related links:
-
http://closer.scitev...
-
show more...
-
https://ri.diva-port... (primary) (Raw object)
-
https://urn.kb.se/re...
-
https://urn.kb.se/re...
-
https://urn.kb.se/re...
-
show less...
Abstract
Subject headings
Close
- In this paper we consider the Infrastructure-as-a-Service (IaaS) cloud model which allows cloud users to run their own virtual machines (VMs) on available cloud computing resources. IaaS gives enterprises the possibility to outsource their process workloads with minimal effort and expense. However, one major problem with existing approaches of cloud leasing, is that the users can only get contractual guarantees regarding the integrity of the offered platforms. The fact that the IaaS user himself or herself cannot verify the providerpromised cloud platform integrity, is a security risk which threatens to prevent the IaaS business in general. In this paper we address this issue and propose a novel secure VM launch protocol using Trusted Computing techniques. This protocol allows the cloud IaaS users to securely bind the VM to a trusted computer configuration such that the clear text VM only will run on a platform that has been booted into a trustworthy state. This capability builds user confidence and can serve as an important enabler for creating trust in public clouds. We evaluate the feasibility of our proposed protocol via a full scale system implementation and perform a system security analysis.
Subject headings
- TEKNIK OCH TEKNOLOGIER -- Elektroteknik och elektronik (hsv//swe)
- ENGINEERING AND TECHNOLOGY -- Electrical Engineering, Electronic Engineering, Information Engineering (hsv//eng)
- NATURVETENSKAP -- Data- och informationsvetenskap (hsv//swe)
- NATURAL SCIENCES -- Computer and Information Sciences (hsv//eng)
Keyword
- Cloud computing
- IaaS
- Security
- Trusted computing
- Virtualization
- Clear text
- Cloud models
- Computer configuration
- Computing resource
- Full-scale system
- Outsource
- Platform integrity
- Security risks
- System security
- Virtual machines
- Virtualizations
- Computer simulation
- Industry
- Computer Science
Publication and Content Type
- ref (subject category)
- kon (subject category)
Find in a library
To the university's database