Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop 2010
DOI: 10.1145/1866835.1866843
|View full text |Cite
|
Sign up to set email alerts
|

Seeding clouds with trust anchors

Abstract: Customers with security-critical data processing needs are beginning to push back strongly against using cloud computing. Cloud vendors run their computations upon cloud provided VM systems, but customers are worried such host systems may not be able to protect themselves from attack, ensure isolation of customer processing, or load customer processing correctly. To provide assurance of data processing protection in clouds to customers, we advocate methods to improve cloud transparency using hardware-based att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 83 publications
(44 citation statements)
references
References 16 publications
0
43
0
Order By: Relevance
“…An impediment of this arrangement is that the trusted organizer keeps up data about all hosts sent on the IaaS stage, making it an important focus to an enemy who endeavors to uncover people in general IaaS supplier to security assaults. A decentralized way to deal with honesty confirmation is embraced by Schiffman et al [2] to address the restricted straightforwardness of IaaS stages and versatility limits forced by outsider trustworthiness confirmation instruments. The creators portray a trusted engineering where inhabitants confirm the uprightness of IaaS has through a trusted cloud verifier intermediary set in the cloud supplier space.…”
Section: A Trusted Launchmentioning
confidence: 99%
See 3 more Smart Citations
“…An impediment of this arrangement is that the trusted organizer keeps up data about all hosts sent on the IaaS stage, making it an important focus to an enemy who endeavors to uncover people in general IaaS supplier to security assaults. A decentralized way to deal with honesty confirmation is embraced by Schiffman et al [2] to address the restricted straightforwardness of IaaS stages and versatility limits forced by outsider trustworthiness confirmation instruments. The creators portray a trusted engineering where inhabitants confirm the uprightness of IaaS has through a trusted cloud verifier intermediary set in the cloud supplier space.…”
Section: A Trusted Launchmentioning
confidence: 99%
“…We depict distributed storage security systems that permit simple information relocation between suppliers without influencing its confidentiality. Graf et al [2] exhibited an IaaS stockpiling security conspire tending to get to control. The creators break down get to rights administration of shared formed scrambled information on cloud framework for a limited gathering and propose a versatile and flexible key administration conspire.…”
Section: B Secure Storagementioning
confidence: 99%
See 2 more Smart Citations
“…Thus, it provides the means to achieve verifiability and transparency of a trusted platform's software state. Trusted Computing enables the establishment of trusted execution environments in commodity cloud infrastructures [37,36]. However, the reliable and efficient attestation of execution environments at run-time remains an open research problem.…”
Section: Trusted Computingmentioning
confidence: 99%