2022
DOI: 10.21203/rs.3.rs-2193898/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-based Cloud Services

Abstract: The large-scale deployment of cloud composite services distributed over heterogeneous environments poses new challenges in terms of security management. In particular, the migration of their resources is facilitated by recent advances in the area of virtualization techniques. This contributes to increase the dynamics of their configuration, and may induce vulnerabilities that could compromise the security of cloud resources, or even of the whole service. In addition, cloud providers may be reluctant to share p… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…For instance, they target integrating software trusted platform modules (TPM) into hypervisor environments in order to make TPM functions available to virtual machines. Also, we have shown in [26] how risk management methods can be applied to cloud infrastructures, in order to automatically determine the counter-measures to be applied during resource migrations. Most of existing techniques on inter-cloud security management are centered on identity management and access control, and do not exploit the knowledge provided by the specification of cloud composite services.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, they target integrating software trusted platform modules (TPM) into hypervisor environments in order to make TPM functions available to virtual machines. Also, we have shown in [26] how risk management methods can be applied to cloud infrastructures, in order to automatically determine the counter-measures to be applied during resource migrations. Most of existing techniques on inter-cloud security management are centered on identity management and access control, and do not exploit the knowledge provided by the specification of cloud composite services.…”
Section: Related Workmentioning
confidence: 99%