SwePub
Sök i LIBRIS databas

  Extended search

onr:"swepub:oai:DiVA.org:ri-51820"
 

Search: onr:"swepub:oai:DiVA.org:ri-51820" > Securely launching ...

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Securely launching virtual machines on trustworthy platforms in a public cloud : An enterprise's perspective

Aslam, Mudassar, 1979- (author)
RISE,SICS,Swedish Institute of Computer Science, Kista
Gehrmann, Christian (author)
RISE,SICS,Swedish Institute of Computer Science, Kista,Security Lab
Rasmusson, Lars (author)
RISE,SICS,Swedish Institute of Computer Science, Kista,Computer Systems Laboratory
show more...
Björkman, Mats (author)
Mälardalens högskola,Akademin för innovation, design och teknik
show less...
 (creator_code:org_t)
2012
2012
English.
In: CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. - 9789898565051 ; , s. 511-521
  • Conference paper (peer-reviewed)
Abstract Subject headings
Close  
  • In this paper we consider the Infrastructure-as-a-Service (IaaS) cloud model which allows cloud users to run their own virtual machines (VMs) on available cloud computing resources. IaaS gives enterprises the possibility to outsource their process workloads with minimal effort and expense. However, one major problem with existing approaches of cloud leasing, is that the users can only get contractual guarantees regarding the integrity of the offered platforms. The fact that the IaaS user himself or herself cannot verify the providerpromised cloud platform integrity, is a security risk which threatens to prevent the IaaS business in general. In this paper we address this issue and propose a novel secure VM launch protocol using Trusted Computing techniques. This protocol allows the cloud IaaS users to securely bind the VM to a trusted computer configuration such that the clear text VM only will run on a platform that has been booted into a trustworthy state. This capability builds user confidence and can serve as an important enabler for creating trust in public clouds. We evaluate the feasibility of our proposed protocol via a full scale system implementation and perform a system security analysis.

Subject headings

TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering (hsv//eng)
NATURVETENSKAP  -- Data- och informationsvetenskap (hsv//swe)
NATURAL SCIENCES  -- Computer and Information Sciences (hsv//eng)

Keyword

Cloud computing
IaaS
Security
Trusted computing
Virtualization
Clear text
Cloud models
Computer configuration
Computing resource
Full-scale system
Outsource
Platform integrity
Security risks
System security
Virtual machines
Virtualizations
Computer simulation
Industry
Computer Science

Publication and Content Type

ref (subject category)
kon (subject category)

Find in a library

To the university's database

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Find more in SwePub

By the author/editor
Aslam, Mudassar, ...
Gehrmann, Christ ...
Rasmusson, Lars
Björkman, Mats
About the subject
ENGINEERING AND TECHNOLOGY
ENGINEERING AND ...
and Electrical Engin ...
NATURAL SCIENCES
NATURAL SCIENCES
and Computer and Inf ...
Articles in the publication
CLOSER 2012 - Pr ...
By the university
RISE
Mälardalen University

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view