ABSTRACT
As long as the use of distributed systems and Cloud Computing is significantly increasing, the amount of threats concerning the security of such systems and the data stored in them set great challenges on the application of Trusted Computing. In this work, we aim to discuss the Trusted Computing approaches applied on Cloud Computing security and focusing on their drawbacks on hardware verification (i.e., to attest hardware's integrity). We propose a model for hardware integrity attestation applied on Cloud Computing systems, presenting the main protocol based on the use of Endorsement Keys (EK) known from Trusted Computing. The validity of our protocol and its potentials against hardware-based attacks is proved by the combined use of verified Public-Key encryption algorithms.
- Asokan, N., Ekberg, J. E., Kostiainen, K., Rajan, A., Rozas, C., Sadeghi, A. R., Schulz, S. and Wachsmann, C.: Mobile trusted computing. Proceedings of the IEEE, 102(8), pp. 1189--1206 (2014).Google ScholarCross Ref
- Chen, Y., Paxson, V. and Katz, R. H.: What's new about cloud computing security. University of California, Berkeley Report No. UCB/EECS-2010-5 (2010).Google Scholar
- England, P. and Tariq, T: Towards a programmable TPM. In: International Conference on Trusted Computing, pp. 1--13 (2009). Google ScholarDigital Library
- Krautheim, F. J., Phatak, D. S., and Sherman, A. T.: Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing. In International Conference on Trust and Trustworthy Computing, pp. 211--227 (2010). Google ScholarDigital Library
- Li, X. Y., Zhou, L. T., Shi, Y., and Guo, Y.: A trusted computing environment model in cloud architecture. In International Conference on Machine Learning and Cybernetics (ICMLC), pp. 2843--2848(2010).Google ScholarCross Ref
- Maene, P., Götzfried, J., de Clercq, R., Müller, T., Freiling, F., and Verbauwhede, I.: Hardware-Based Trusted Computing Architectures for Isolation and Attestation. IEEE Transactions on Computers (2017).Google Scholar
- Madhavi, K. V., Tamilkodi, R., and Jaya Sudha, K.: Cloud Computing: Security threats and Counter Measures. In International Journal of Research in Computer and Communication Technology (IJRCCT), pp. 125--128 (2012).Google Scholar
- Parno, B., McCune, J. M. and Perrig, A.: Bootstrapping trust in commodity computers. In Security and privacy (SP), pp. 414--429 (2010). Google ScholarDigital Library
- Reddy, V. K., Rao, B. T., and Reddy, L. S. S.: Research issues in cloud computing. Global Journal of Computer Science and Technology, 11(11) (2011).Google Scholar
- Santos, N., Gummadi, K. P. and Rodrigues, R.: Towards Trusted Cloud Computing. HotCloud, 9(9), 3 (2009). Google ScholarDigital Library
- Sanjay Ram, M., and Vijayaraj, V.: Analysis of the characteristics and trusted security of cloud computing. International Journal on Cloud Computing, 1, 61--69 (2011).Google Scholar
- Shen, Z., Li, L., Yan, F., and Wu, X.: Cloud computing system based on trusted computing platform. In International Conference on Intelligent Computation Technology and Automation (ICI-CTA), pp. 942--945 (2010). Google ScholarDigital Library
- Shen, Z., and Tong. 'Q.: The security of cloud computing system enabled by trusted computing technology. In 2nd International Conference on Signal Processing Systems (ICSPS), pp. 11--15 (2010).Google ScholarCross Ref
- Youssef, A. E. and Alageel, M.: A framework for secure cloud computing, IJCSI International Journal of Computer Science Issues, 9(4), 487--500 (2012).Google Scholar
Recommendations
Reconfigurable trusted computing in hardware
STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computingTrusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The TrustedComputing Group (TCG) has proposed several specifications to implement TC functionalities by extensions to common computing platforms, ...
Design and Deployment of a Trusted Eucalyptus Cloud
CLOUD '11: Proceedings of the 2011 IEEE 4th International Conference on Cloud ComputingShift from traditional software models to the Internet has been steadily gaining momentum over the last 10 years. Moving business applications to the shared utility infrastructure of the cloud with its pay-as-you-go and auto scaling features has become ...
Concerning about Trust of Platform Hardware
PACIIA '08: Proceedings of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application - Volume 02This paper investigates the hardware trust of a trusted computing platform. Initially, some prior researches are discussed. Based on these researches, we point out that hardware trust is the same important as the software trust in a trusted computing ...
Comments