skip to main content
10.1145/2660267.2662383acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

POSTER: An E2E Trusted Cloud Infrastructure

Published: 03 November 2014 Publication History

Abstract

In this paper, a framework of end to end (E2E) trusted cloud infrastructure is proposed. On one end of the cloud provider, the trusted chain is extended to VMM and VM by trusted measurement and remote attestation, which can assure the trust of VMM and VM. On another end of the cloud terminal, the trusted mechanism is used to protect the terminal security. For the trust of cloud network, trusted network connect (TNC) is leveraged to protect the security of communication between the loud provider and the cloud terminal. The E2E trusted cloud infrastructure provides an E2E trusted protection for cloud computing. In addition, it can support the Chinese cryptographic algorithm (SMx) based on TPM 2.0.

References

[1]
GARFINKEL T, PFAFF B, CHOW J, et al. Terra: A virtual machine-based platform for trusted computing. ACM SIGOPS Operating Systems Review. ACM, pp. 193--206.
[2]
IntelCorp. Intel Trusted Execution Technology. http://www.intel.com/technology/security/
[3]
Intel Corp. Trusted Boot (tboot). http://sourceforge.net/projects/tboot, 2007.
[4]
AZAB A M, NING Peng, WANG Zhi, et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. Proceedings of the 17th ACM conference on Computer and communications security, ACM, 2010, pp. 38--49.
[5]
DAI Weiqi, JIN Hai, ZOU Deqing, et al. TEE: a virtual DRTM based execution environment for secure cloud-end computing. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010), New York.
[6]
B. D. Payne, M. Carbone, and W. Lee. Secure and Flexible Monitoring of Virtual Machines. In Proc. of ACSAC'07, 2007.
[7]
SANTOS N, GUMMADI K.P, RODRIGUES R. Towards trusted Cloud Computing. In Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, Hot-Cloud2009. USENIX Association, Berkeley (2009).
[8]
SCHIFFMAN J, MOYER T, VIJAYAKUMAR H, et al. Seeding Clouds With Trust Anchors. In Proceedings of the, ACM Workshop on Cloud Computing Security, CCSW 2010, pp. 43--46. ACM, New York (2010).
[9]
ASLAM M, GEHRMANN C, RASMUSSON L, et al. Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud - An Enterprise's Perspective. Leymann, F. Ivanov, I. van Sinderen, M.,Shan, T. (eds.) CLOSER,pp. 511--521. SciTePress (2012).
[10]
PALADI N, GEHRMANN C, ASLAM M, et al. Trusted Launch of Virtual Machine Instances in Public IaaS Environments. T. Kwon, M.-K. Lee, and D. Kwon ( E d s.): ICISC 2012, LNCS 7839, pp.309--323, 2013.
[11]
Chen Chen, Himanshu Raj, Stefan Saroiu, and Alec Wolman. "cTPM: A Cloud TPM for Cross-Device Trusted Applications", In NSDI, April 2014.

Cited By

View all
  • (2022)vTPM-SM: An Application Scheme of SM2/SM3/SM4 Algorithms Based on Trusted Computing in Cloud Environment2022 IEEE 15th International Conference on Cloud Computing (CLOUD)10.1109/CLOUD55607.2022.00058(351-356)Online publication date: Jul-2022
  • (2019)Trusted Cloud Computing Architectures for infrastructure as a serviceComputers and Security10.1016/j.cose.2018.12.01482:C(196-226)Online publication date: 1-May-2019
  • (2019)Recent trends in applying TPM to cloud computingSECURITY AND PRIVACY10.1002/spy2.933:1Online publication date: 28-Nov-2019
  • Show More Cited By

Index Terms

  1. POSTER: An E2E Trusted Cloud Infrastructure

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
    November 2014
    1592 pages
    ISBN:9781450329576
    DOI:10.1145/2660267
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 November 2014

    Check for updates

    Author Tags

    1. cloud computing
    2. security
    3. trusted computing
    4. virtual machine

    Qualifiers

    • Poster

    Conference

    CCS'14
    Sponsor:

    Acceptance Rates

    CCS '14 Paper Acceptance Rate 114 of 585 submissions, 19%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)vTPM-SM: An Application Scheme of SM2/SM3/SM4 Algorithms Based on Trusted Computing in Cloud Environment2022 IEEE 15th International Conference on Cloud Computing (CLOUD)10.1109/CLOUD55607.2022.00058(351-356)Online publication date: Jul-2022
    • (2019)Trusted Cloud Computing Architectures for infrastructure as a serviceComputers and Security10.1016/j.cose.2018.12.01482:C(196-226)Online publication date: 1-May-2019
    • (2019)Recent trends in applying TPM to cloud computingSECURITY AND PRIVACY10.1002/spy2.933:1Online publication date: 28-Nov-2019
    • (2018)Enabling Security-Enhanced Attestation With Intel SGX for Remote Terminal and IoTIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2017.275006737:1(88-96)Online publication date: Jan-2018
    • (2017)Building a Secure Scheme for a Trusted Hardware Sharing EnvironmentIEEE Access10.1109/ACCESS.2017.27031245(20260-20271)Online publication date: 2017
    • (2017)A Trusted VM Live Migration Protocol in IaaSTrusted Computing and Information Security10.1007/978-981-10-7080-8_4(41-52)Online publication date: 23-Nov-2017

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media