DocumentCode :
3264679
Title :
TREASURE: Trust Enhanced Security for Cloud Environments
Author :
Varadharajan, Vijay ; Tupakula, Udaya
Author_Institution :
Dept. of Comput., Macquarie Univ., Sydney, NSW, Australia
fYear :
2012
fDate :
25-27 June 2012
Firstpage :
145
Lastpage :
152
Abstract :
Today, cloud computing is one of the popular technologies. In addition to this, most of the hardware that is being shipped today is equipped with the TPM which can be used for realization of trusted platforms. Recently several TPM attestation techniques such as binary attestation and property based attestation techniques have been proposed but there are some fundamental issues that need to be addressed for using these techniques in practice. In this paper we consider an architecture where different services are hosted on the cloud infrastructure by multiple cloud customers (tenants). Then we consider an attacker model that is specific to the cloud and some of the challenges with the current TPM based attestation techniques. We will also propose a novel trust enhanced security model for cloud which overcomes the challenges with the current TPM based attestation techniques and efficiently deals with the attacks in the cloud. In our model, the cloud service provider is used as the Certification Authority (CA) for the tenant virtual machines. The CA only certifies the basic security properties which are the assurance on the traffic originating from the tenant virtual machine and validation of the tenant virtual machine transactions. The components of the CA monitor the interactions of the tenant virtual machine for the certified properties. Since the tenant virtual machines are running on the cloud service provider infrastructure, it is aware of the dynamic changes to the tenant virtual machine. The CA can terminate the ongoing transactions and/or dynamically isolate the tenant virtual machine if there is a variation in the behaviour of the tenant virtual machine from the certified properties. Hence our model can be used to address the challenges with the current TPM based attestation techniques and efficiently deal with the attacks in the cloud. We will present implementation of our model on Xen and how it deals with the attacks in different attack case scenarios. We - ill also show that our model is beneficial for the cloud service providers, tenants and tenant customers.
Keywords :
cloud computing; trusted computing; virtual machines; CA; TPM attestation techniques; TREASURE; Xen; attacker model; binary attestation; certification authority; cloud computing; cloud service provider; property based attestation techniques; tenant virtual machine transactions; trust enhanced security for cloud environments; trust enhanced security model; trusted platforms; Certification; Cloud computing; Hardware; Security; Servers; Virtual machining; Attestation; Cloud Security; Trusted Computing; Virtual Machine Monitor; Zero Day attacks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
Type :
conf
DOI :
10.1109/TrustCom.2012.283
Filename :
6295969
Link To Document :
بازگشت