Tenants attested Trusted Cloud Service

被引:0
|
作者
Ren, Jiangchun [1 ]
Liu, Ling [2 ]
Zhang, Da [1 ]
Zhang, Qi [2 ]
Ba, Haihe [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha, Hunan, Peoples R China
[2] Georgia Inst Technol, Sch Comp Sci, Coll Comp, Atlanta, GA 30332 USA
基金
美国国家科学基金会; 国家高技术研究发展计划(863计划);
关键词
cloud; trust; remote attestation; VM introspection;
D O I
10.1109/CLOUD.2016.83
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has successfully enabled large scale computing to be offered as pay-as-you-go services to many enterprise and individual tenants. However, the trust on public cloud services has been a sensitive issue for both cloud tenants and cloud service providers (CSPs). Tenants tend to worry about losing the total control over their codes and data hosted on remote servers. Public cloud providers often fear that the applications uploaded by their tenants may carry vicious codes, which may cause serious violations of security and privacy on their cloud platforms. This trust issue has slowed down the wide deployment of public clouds and hindered the promises of cloud computing for both CSPs and Cloud consumers. In this paper, we present Ta-TCS, a novel system framework for two-phase tenants attested trust validation and trust management over their remote VMs and cloud service executions. At the CSP end, we build a Minimal Trusted Environment (MTE) in VMM and an Integrity Verification & Report Service (IVRS) hosted in the control domain Dom0. At the tenant end, we deploy an Integrity Configuration and Attestation Service (ICAS) in new framework. With Ta-TCS, tenants can configure and attest the integrity of their services, and Cloud providers can verify codes running on a guest VM by introspection. Tenants can also check whether the basic platform of Dom0 is trusted or not. This two phase trust establishment increases the level of mutual trust between tenants and its CSP. We implement the first prototype system of Ta-TCS on Xen platform, and most of our implementation mechanisms can be deployed to some open-source virtualization platforms such as KVM. Our evaluation results show that Ta-TCS is effective with negligible performance overhead.
引用
收藏
页码:600 / 607
页数:8
相关论文
共 50 条
  • [31] Efficient trusted security technology of user authentication and service collaboration in cloud manufacturing system
    Zhao L.
    Li B.
    Shi G.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2022, 44 (12): : 3710 - 3718
  • [32] DSDM-TCSE: Deterministic storage and deletion mechanism for trusted cloud service environments
    Yi, Wenlong
    Wang, Chuang
    Chen, Jie
    Kuzmin, Sergey
    Gerasimov, Igor
    Cheng, Xiangping
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 165
  • [33] Realization of a data traceability and recovery service for a trusted authority service co-ordination within a Cloud environment
    Zawawi, Nour
    Hamdy, Mohamed
    Ghary, R.
    Tolba, M. F.
    SOFT COMPUTING, 2016, 20 (12) : 5039 - 5050
  • [34] Realization of a data traceability and recovery service for a trusted authority service co-ordination within a Cloud environment
    Nour Zawawi
    Mohamed Hamdy
    R. Ghary
    M. F. Tolba
    Soft Computing, 2016, 20 : 5039 - 5050
  • [35] Trusted Configuration in Cloud FPGAs
    Zeitouni, Shaza
    Vliegen, Jo
    Frassetto, Tommaso
    Koch, Dirk
    Sadeghi, Ahmad-Reza
    Mentens, Nele
    2021 IEEE 29TH ANNUAL INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES (FCCM 2021), 2021, : 233 - 241
  • [36] Experiences in Trusted Cloud Computing
    Oliver, Ian
    Holtmanns, Silke
    Miche, Yoan
    Lal, Shankar
    Hippelainen, Leo
    Kalliola, Aapo
    Ravidas, Sowmya
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 19 - 30
  • [37] Experiences in Trusted Cloud Computing
    Oliver, Ian (ian.oliver@nokia-bell-labs.com), 2018, River Publishers (06):
  • [38] The Trusted Cloud Transfer Protocol
    Slawik, Mathias
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, : 203 - 208
  • [39] Trusted Computation with an Adversarial Cloud
    Bopardikar, Shaunak D.
    Speranzon, Alberto
    Langbort, Cedric
    2015 AMERICAN CONTROL CONFERENCE (ACC), 2015, : 2445 - 2452
  • [40] Secure and Trusted Cloud of Things
    Bhattasali, Tapalina
    Chaki, Rituparna
    Chaki, Nabendu
    2013 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2013,