Filters








4,183 Hits in 6.5 sec

Bootstrapping and maintaining trust in the cloud

Nabil Schear, Patrick T. Cable, Thomas M. Moyer, Bryan Richard, Robert Rudd
2016 Proceedings of the 32nd Annual Conference on Computer Security Applications - ACSAC '16  
Today's infrastructure as a service (IaaS) cloud environments rely upon full trust in the provider to secure applications and data.  ...  We show that our bootstrapping protocol can derive a key in less than two seconds, we can detect system integrity violations in as little as 110ms, and that keylime can scale to thousands of IaaS cloud  ...  CONCLUSION In this paper, we have shown that keylime provides a fully integrated solution to bootstrap and maintain hardwarerooted trust in elastically provisioned IaaS clouds.  ... 
doi:10.1145/2991079.2991104 fatcat:ibvgie3rkzcwjlfkoq6p6u3jia

FPGAs for trusted cloud computing

Ken Eguro, Ramarathnam Venkatesan
2012 22nd International Conference on Field Programmable Logic and Applications (FPL)  
However, in this paper we describe how protected bitstreams can also be used to create a root of trust for the clients of cloud computing services.  ...  We examine how this approach can be applied to the specific application of handling sensitive health data. This system maintains the advantages of the cloud with minimal additional hardware.  ...  In this example, although the client can leverage the computational and storage power of the cloud for the database and analytics, they must still maintain one or more local servers to perform tokenization  ... 
doi:10.1109/fpl.2012.6339242 dblp:conf/fpl/EguroV12 fatcat:ulmfw4csqzgo7oe46xzmuou4cy

Trusted Virtual Infrastructure Bootstrapping for On Demand Services

Peter Membrey, Keith C.C. Chan, Canh Ngo, Yuri Demchenko, Cees de Laat
2012 2012 Seventh International Conference on Availability, Reliability and Security  
As cloud computing continues to gain traction, a great deal of effort is being expended in researching the most effective ways to build and manage secure and trustworthy clouds.  ...  deployment of a bootstrapping tool (referred to as the Bootstrapping Initiator (BI)).  ...  The process enables a client machine to authenticate a remote machine, determine that the machine is in a trusted state and begin the bootstrapping process.  ... 
doi:10.1109/ares.2012.82 dblp:conf/IEEEares/MembreyCNDL12 fatcat:wpczutnqkbfu3jh5l74iedisxa

Defining Intercloud Security Framework And Architecture Components For Multi-Cloud Data Intensive Applications

Yuri Demchenko, Fatih Turkmen, Cees De Laat, Mathias Slawik
2017 Zenodo  
The paper discusses implementation of the Trust Bootstrapping Protocol as an important mechanism to ensure consistent security in the virtualised inter-cloud environment  ...  The paper provides overview of the cloud compliance standards and their role in cloud security.  ...  ACKNOWLEDGEMENT The research leading to these results has received funding from the Horizon2020 project CYCLONE (funded by the European Commission under grant number 644925).  ... 
doi:10.5281/zenodo.1044392 fatcat:6xedvzt7tneoxgnyzugxvmagqy

RepCloud: Attesting to Cloud Service Dependency

Anbang Ruan, Andrew Martin
2017 IEEE Transactions on Services Computing  
However, the current Trusted Clouds have difficulties in effectively attesting to the cloud service dependency for customers' applications, due to the cloud's complexity, heterogeneity and dynamism.  ...  In this paper, we present RepCloud, a decentralized cloud trust management framework, inspired by the reputation systems from the research in peerto-peer systems.  ...  The Core is maintained by the Attestation Module and the Trust Propagation Module.  ... 
doi:10.1109/tsc.2016.2558513 fatcat:fp2mrjcr6bb33gi6zqaqc5qvju

Game Theory Based Trust Model for Cloud Environment

K. Gokulnath, Rhymend Uthariaraj
2015 The Scientific World Journal  
The aim of this work is to propose a method to establish trust at bootload level in cloud computing environment.  ...  In addition appropriate mapping of cloud user's application to cloud service provider for segregating trust level is achieved as a part of mapping.  ...  Acknowledgment The authors would like to thank Anna Centenary Research Fellowship (ACRF), a funding body for supporting the project through financial assistance in the form of stipends and contingencies  ... 
doi:10.1155/2015/709827 pmid:26380365 pmcid:PMC4562172 fatcat:wv5hvvwmqfbxrhdqhwqz3l4zzi

TinCan: User-Defined P2P Virtual Network Overlays for Ad-hoc Collaboration

Pierre St Juste, Kyuho Jeong, Heungsik Eom, Corey Baker, Renato Figueiredo
2014 EAI Endorsed Transactions on Collaborative Computing  
In this approach, trust relationships maintained by centralized (or federated) services are automatically mapped to TinCan links.  ...  Results quantify the overhead introduced by the network virtualization layer, and the resource requirements imposed on services needed to bootstrap TinCan links.  ...  The messaging overlays play a crucial role in providing access to the network and as well as serving as a trust anchor for signaling and bootstrapping private TinCan links.  ... 
doi:10.4108/cc.1.2.e4 fatcat:u3mhnekxynecxfs4z726ejid5i

Access control infrastructure for on-demand provisioned virtualised infrastructure services

Yuri Demchenko, Canh Ngo, Cees de Laat
2011 2011 International Conference on Collaboration Technologies and Systems (CTS)  
Cloud technologies are emerging as a new way of provisioning virtualised computing and infrastructure services on-demand for collaborative projects and groups.  ...  The paper discusses security mechanisms that are required for consistent DACI operation, in particular use of authorisation tokens for access control and authorisation session context exchange between  ...  ACKNOWLEDGEMENT This work is supported by the FP7 EU funded project GEANT3 (FP7-ICT-238875), and the FP7 EU funded Integrated project The Generalised Architecture for Dynamic Infrastructure Services (GEYSERS  ... 
doi:10.1109/cts.2011.5928725 dblp:conf/cts/DemchenkoNL11 fatcat:h46ecb3lhnewzkdznwzoohjulq

myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment

David Wallom, Matteo Turilli, Andrew Martin, Anbang Raun, Gareth Taylor, Nigel Hargreaves, Alan McMoran
2011 2011 IEEE Third International Conference on Cloud Computing Technology and Science  
In this paper, a use case is presented illustrating how the integration of Trusted Computing technologies into an available cloud infrastructure -Eucalyptusallows the security-critical energy industry  ...  The growing number of communities that are adopting large public cloud resources such as Amazon Web Services [1] or Microsoft Azure [2] proves the success and hence usefulness of the Cloud Computing paradigm  ...  PERFORMANCE ANALYSYS The integration of trusted computing and cloud computing introduces performance overheads in the system bootstrapping and remote attestation procedures.  ... 
doi:10.1109/cloudcom.2011.41 dblp:conf/cloudcom/WallomTMRTHM11 fatcat:jxrugzrpkbclzj4hu665nnd2oa

myTrustedCloud

David Wallom, Matteo Turilli, Andrew Martin, Anbang Raun, Gareth Taylor, Nigel Hargreaves, Alan McMoran
2012 Proceedings of the WICSA/ECSA 2012 Companion Volume on - WICSA/ECSA '12  
In this paper, a use case is presented illustrating how the integration of Trusted Computing technologies into an available cloud infrastructure -Eucalyptusallows the security-critical energy industry  ...  The growing number of communities that are adopting large public cloud resources such as Amazon Web Services [1] or Microsoft Azure [2] proves the success and hence usefulness of the Cloud Computing paradigm  ...  PERFORMANCE ANALYSYS The integration of trusted computing and cloud computing introduces performance overheads in the system bootstrapping and remote attestation procedures.  ... 
doi:10.1145/2361999.2362014 dblp:conf/wicsa/WallomTMRTHM12 fatcat:lht2ble37bd2nnjxwxhrepqydu

Security Infrastructure for On-demand Provisioned Cloud Infrastructure Services

Yuri Demchenko, Canh Ngo, Cees de Laat, Tomasz Wiktor Wlodarczyk, Chunming Rong, Wolfgang Ziegler
2011 2011 IEEE Third International Conference on Cloud Computing Technology and Science  
In this paper we discuss both aspects of the Cloud Security and provide suggestions about required security mechanisms for secure data management in dynamically provisioned Cloud infrastructures.  ...  Providing consistent security services in on-demand provisioned Cloud infrastructure services is of primary importance due to multi-tenant and potentially multi-provider nature of Clouds Infrastructure  ...  ACKNOWLEDGEMENTS This work is supported by the FP7 EU funded project GEANT3 (FP7-ICT-238875), and the FP7 EU funded Integrated project The Generalised Architecture for Dynamic Infrastructure Services (  ... 
doi:10.1109/cloudcom.2011.42 dblp:conf/cloudcom/DemchenkoNLWRZ11 fatcat:me72gxwd7bfb7ke2d7e7pciaea

SAPPHIRE: Anonymity for enhanced control and private collaboration in healthcare clouds

John Pecarina, Shi Pu, Jyh-Charn Liu
2012 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings  
We propose a paradigm shift in the interaction of users with cloud services that removes unwarranted trust in the cloud service provider and provisions accessibility for collaborators.  ...  The dispensation of authorizations in the SAPPHIRE architecture bootstraps a traditional Kerberos ticket-based approach with 'trust verifications'.  ...  The Exchange is also trusted to relay cloud storage requests, to authenticate users for the cloud, and to know the sender or receiver, In this setting, Exchange is not trusted to read non-PII data or hold  ... 
doi:10.1109/cloudcom.2012.6427488 dblp:conf/cloudcom/PecarinaPL12 fatcat:l3omsvzbk5eo7ocsusssa4cbxu

SocialCloud: Using Social Networks for Building Distributed Computing Services [article]

Abedelaziz Mohaisen and Huy Tran and Abhishek Chandra and Yongdae Kim
2011 arXiv   pre-print
In this paper we investigate a new computing paradigm, called SocialCloud, in which computing nodes are governed by social ties driven from a bootstrapping trust-possessing social graph.  ...  We investigate how this paradigm differs from existing computing paradigms, such as grid computing and the conventional cloud computing paradigms.  ...  that characterize trust relationships to bootstrap trust in the proposed computing service.  ... 
arXiv:1112.2254v1 fatcat:clbpkvsx5neopmhzr4pb3yibha

TrustVP: Construction and Evolution of Trusted Chain on Virtualization Computing Platform

Xue Dongliang, Wu Xiaolong, Gao Yunwei, Song Ying, Tian Xinhui, Li Zhaopeng
2012 2012 Eighth International Conference on Computational Intelligence and Security  
Trusted chain technology provides a good opportunity to guarantee software and data integrities on cloud computing platforms.  ...  Furthermore, the system has been deployed in a large-scale communication enterprise and the results reveal that our system is safe, stable, and easy to use.  ...  ACKNOWLEDGMENT We thank the anonymous reviewers and my supervisor Yuzhong Sun for his helpful suggestions.  ... 
doi:10.1109/cis.2012.145 dblp:conf/cis/XueWGSTL12 fatcat:e736geg5cbba5pc75gt62fk6ze

Dynamic Secure Interconnection for Security Enhancement in Cloud Computing

Liwen He, Feiyi Huang, Jie Zhang, Bin Liu, Chunling Chen, Zonghua Zhang, Yang Yang, Weifeng Lu
2016 International Journal of Computers Communications & Control  
In this paper, novel dynamic secure interconnection (DSI) mechanism is proposed to isolate he cloud computing system into a couple of dynamic virtual trust zones with different ecurity policies implemented  ...  However, t also introduces new security issues because the data management and ownership re separated, and the management is operated on a virtualized platform.  ...  VM 1, 2, 5, 6 are configured in the same virtual trust zone and VM 3, 4, 7, 8 in the same zone. Dynamic Secure Interconnection for Security Enhancement in Cloud Computing 351  ... 
doi:10.15837/ijccc.2016.3.504 fatcat:itfh4frk5rdirp27dqmv2zi33i
« Previous Showing results 1 — 15 out of 4,183 results