Implementing trust in cloud infrastructures

Ricardo Neisse, Dominik Holling, Alexander Pretschner

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

50 Scopus citations

Abstract

Today's cloud computing infrastructures usually require customers who transfer data into the cloud to trust the providers of the cloud infrastructure. Not every customer is willing to grant this trust without justification. It should be possible to detect that at least the configuration of the cloud infrastructure - as provided in the form of a hyper visor and administrative domain software - has not been changed without the customer's consent. We present a system that enables periodical and necessity-driven integrity measurements and remote attestations of vital parts of cloud computing infrastructures. Building on the analysis of several relevant attack scenarios, our system is implemented on top of the Xen Cloud Platform and makes use of trusted computing technology to provide security guarantees. We evaluate both security and performance of this system. We show how our system attests the integrity of a cloud infrastructure and detects all changes performed by system administrators in a typical software configuration, even in the presence of a simulated denial-of-service attack.

Original languageEnglish
Title of host publicationProceedings - 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2011
Pages524-533
Number of pages10
DOIs
StatePublished - 2011
Externally publishedYes
Event11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2011 - Newport Beach, CA, United States
Duration: 23 May 201126 May 2011

Publication series

NameProceedings - 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2011

Conference

Conference11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2011
Country/TerritoryUnited States
CityNewport Beach, CA
Period23/05/1126/05/11

Keywords

  • cloud computing
  • runtime integrity checking
  • trust
  • trusted computing

Fingerprint

Dive into the research topics of 'Implementing trust in cloud infrastructures'. Together they form a unique fingerprint.

Cite this