DocumentCode :
653490
Title :
Integrity Protection and Attestation of Security Critical Executions on Virtualized Platform in Cloud Computing Environment
Author :
Bingyu Zou ; Zhang, Haijun ; Huanguo Zhang
Author_Institution :
Dept. of Comput. Sci., Wuhan Univ., Wuhan, China
fYear :
2013
fDate :
20-23 Aug. 2013
Firstpage :
2071
Lastpage :
2075
Abstract :
As cloud infrastructure saves cloud user the budget to purchase relatively expensive and easily outdated hardware and the energy to maintain system, some compromises comes along as well, such as computing environment and stored data out of control, which put cloud user on the horns of a dilemma. In order for cloud users to have more faith with the security of computing environment and data on the remote uncontrolled cloud, trust should be built between them. It\´s easier to trust when you can verify. We took advantage of sealed storage of trust computing to improve traditional trust chain technology in order to provide a dual verifiable trusted bootstrap to make sure each compartment during system bootstrap not to be maliciously changed. We extend trusted chain to memory by developing monitoring tools in privileged domain using features provided by virtual machine monitor to monitor and record runtime states of security critical application in targeted virtual machine instance. Inspiring by traditional security technology such as sandbox, we designed and implemented a "out-of-box" fine-grained security critical application monitoring utilizing system call interposition and virtual machine introspection. Measurements of system configurations stored in platform configuration registers of TPM along with runtime states of application in cloud user\´s virtual machine are reported to corresponding cloud user through remote attestation which is a key feature of trusted computing as well in order to provide genuine evidences to cloud user.
Keywords :
cloud computing; storage management; trusted computing; virtual machines; virtualisation; TPM; cloud computing environment; cloud infrastructure; integrity attestation; integrity protection; monitoring tools; out-of-box fine-grained security critical application; outdated hardware; platform configuration registers; remote uncontrolled cloud; sandbox; sealed storage; security critical executions; security technology; stored data; system bootstrap; system configurations; trust chain technology; trust computing; utilizing system call interposition; verifiable trusted bootstrap; virtual machine instance; virtual machine introspection; virtual machine monitor; virtualized platform; Cloud computing; Kernel; Monitoring; Runtime; Security; Virtual machine monitors; Virtual machining; Trusted Computing; remote attestation; runtime security monitoring; virtual machine monitor;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing
Conference_Location :
Beijing
Type :
conf
DOI :
10.1109/GreenCom-iThings-CPSCom.2013.388
Filename :
6682398
Link To Document :
بازگشت