DocumentCode :
3439794
Title :
Building Trust and Compliance in the Cloud for Services
Author :
Yeluri, Raghu ; Castro-Leon, Enrique ; Harmon, Robert R. ; Greene, James
fYear :
2012
fDate :
24-27 July 2012
Firstpage :
379
Lastpage :
390
Abstract :
Security is a key barrier to the broader adoption of cloud computing. The real and perceived risks of providing, accessing and controlling services in multitenant cloud environments can slow or preclude the migration to services by IT organizations. In a non-virtualized environment, the separation provided by physical infrastructure is assumed to provide a level of protection for applications and data. In the cloud, this traditional physical isolation between applications no longer exists. Cloud infrastructure is multi-tenant, with multiple applications utilizing a shared common physical infrastructure. This provides the benefit of much more efficient resource utilization. However, because the physical barriers between applications have been eliminated, it is important to establish compensating security controls to minimize the potential for malware to spread through the cloud. Newer types of malware threats, such as rootkit attacks, can be increasingly difficult to detect using traditional antivirus products. These threats use various methods of concealment to remain undetected as they infect key system components such as hypervisors and drivers. This increases the likelihood that the malware can operate in the background, spread through a cloud environment, and cause greater damage over time. This paper explores challenges in deploying and managing services in a cloud infrastructure from a security perspective, and as an example, discusses work that Intel is doing with partners and the software vendor ecosystem to enable a security enhanced platform and solutions with security anchored and rooted in hardware and firmware to increase visibility and control in the cloud.
Keywords :
cloud computing; invasive software; trusted computing; IT organizations; Intel; cloud computing; cloud infrastructure; compliance; malware threats; multitenant cloud environments; physical infrastructure; rootkit attacks; security controls; security enhanced platform; software vendor ecosystem; trust; Cloud computing; Hardware; Organizations; Security; Standards organizations; Cloud computing; hardware root of trust; security; trusted computing chain;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
SRII Global Conference (SRII), 2012 Annual
Conference_Location :
San Jose, CA
ISSN :
2166-0778
Print_ISBN :
978-1-4673-2318-5
Electronic_ISBN :
2166-0778
Type :
conf
DOI :
10.1109/SRII.2012.49
Filename :
6311017
Link To Document :
بازگشت