2013 IEEE Ninth World Congress on Services 2013
DOI: 10.1109/services.2013.37
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Verifier: Verifiable Auditing Service for IaaS Clouds

Abstract: Abstract-Cloud computing has commoditized compute, storage, and networking resources creating an on-demand utility. Despite the attractiveness of this new paradigm, its adoption has been stymied by cloud platform's lack of transparency, which leaves customers unsure if their sensitive data and computation can be entrusted to the cloud. While techniques like encryption can protect customers' data at rest, clouds still lack mechanisms for customers to verify that their computations are being executed as expected… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(16 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…It provides us with proofs of knowledge that show elaborate statements on topology security properties, while keeping the topology itself confidential. Our work complements existing results in the tenant-verifiable integrity of infrastructures with host-based monitoring [34] and the attestation of physical hosts and virtual machines [8]: Graph signatures offer the confidential attestation of the system structure and enable a provider to convince a verifier that the system is structured securely, while keeping the blueprint of the system secret.…”
Section: Introductionmentioning
confidence: 58%
See 1 more Smart Citation
“…It provides us with proofs of knowledge that show elaborate statements on topology security properties, while keeping the topology itself confidential. Our work complements existing results in the tenant-verifiable integrity of infrastructures with host-based monitoring [34] and the attestation of physical hosts and virtual machines [8]: Graph signatures offer the confidential attestation of the system structure and enable a provider to convince a verifier that the system is structured securely, while keeping the blueprint of the system secret.…”
Section: Introductionmentioning
confidence: 58%
“…TPM-protected host-based monitoring of virtualized infrastructures offers an alternative to structural security assurance. Cloud Verifier [34], for example, allows a remote tenant to specify integrity criteria for which Cloud Verifier will monitor a node server. This approach employs an integrity verification proxy as well as TPM support for attestation.…”
Section: Related Workmentioning
confidence: 99%
“…Auditing-as-a-service [85,89,90,114] requires a trusted third party to maintain an audit logs for detecting integrity violations. LibSEAL does not require a trusted third party, but can instead rely on the TEE for privacy and integrity.…”
Section: Related Workmentioning
confidence: 99%
“…The different goals and motivations of vQuery and Cloud Radar (performance versus security) are reflected in the model and configuration translation, where vQuery models many performance metrics and Cloud Radar focuses on capturing the topology and its security. Schiffman et al [13] proposed a monitoring system called Cloud Verifier that allows to monitor hosts and virtual machines with regard to integrity requirements, e.g., based on trusted computing mechanisms.…”
Section: Related Workmentioning
confidence: 99%
“…Existing research in this space is mostly focused on dynamic infrastructure analysis of non-security properties [14], node integrity monitoring [13] or establishing security analyses of static systems given by a configuration snapshot [2]. While the latter results give us confidence about reasoning on security consequences of infrastructure cloud topology and configurations, they suffer from blind spots due to transient security failures as well as from efficiency problems.…”
Section: Introductionmentioning
confidence: 99%