Abstract
Since compute cloud is the most important part of IAAS applications, there are a number of security issues associated with it, including the threat from untrustworthy administrators who may compromise the users’ system without authorization and escape responsibility by deleting logs. Based on previous publication, ways to prevent destruction from administrators mainly fall into three broad categories: SSO(Single Sign On), administration rights distribution, log analyzing. However, any of these methods have strengths and weaknesses. In this document, we come up with a new method “Sentinel”, which combines double-check and the log mechanism and can ensure the security of the system without weakening administrators’ privileges. In our Sentinel, the administrators can only enter the management domain through a unified entrance. The Sentinel is able to detect and intersect destructive instruction and at the same time keep operation logs which are transparent to the administrators.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, Q.: Virtualization and cloud computing. PHEI (2011)
Liu, C.: A dynamic trustworthiness verification mechanism for trusted cloud execution environment. J. Softw. (2013)
Jansen, W.: Guidelines on security and privacy in public cloud computing. NIST, Washington, DC (2011)
Zhang, T.: Research and Design of Web-based SSO System. University of Science and Technology of China (2005)
He, D.: The Design and Implementation of SSO System Unrelated with Application. Builetin of Science and Technology (2012)
Li, H.: Research Based on the Fine-grained Access Control. ZhongShan University (2012)
Xu, Y.: The Separation of Three Rights Data Management. ESAS World (2009)
Dunlap, G.: ReVirt. University of Michigan (2008)
Artem Dinaburg.: Ether. Georgia Institute of Technology (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cui, D., Liu, C., Yang, M., Yang, J. (2015). Sentinel: In Case of the Untrustworthy Behaviors Inside the Clouds. In: Yueming, L., Xu, W., Xi, Z. (eds) Trustworthy Computing and Services. ISCTCS 2014. Communications in Computer and Information Science, vol 520. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47401-3_13
Download citation
DOI: https://doi.org/10.1007/978-3-662-47401-3_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-47400-6
Online ISBN: 978-3-662-47401-3
eBook Packages: Computer ScienceComputer Science (R0)