2013
DOI: 10.1007/978-3-642-37682-5_22
|View full text |Cite
|
Sign up to set email alerts
|

Trusted Launch of Virtual Machine Instances in Public IaaS Environments

Abstract: Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security mechanism for IaaS. In this paper we present a protocol to ensure the launch of a virtual machine (VM) instance on a trusted remote compute host. Relying on Trusted Platform Module operations such as binding and sealing to provide integrity guarantees for clients… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
2
2

Relationship

5
2

Authors

Journals

citations
Cited by 15 publications
(21 citation statements)
references
References 12 publications
0
21
0
Order By: Relevance
“…Earlier work in [19], [20] described interoperable solutions towards trusted VM launch and storage protection in IaaS. We extend them to create an integrated framework that builds a trust chain from the domain manager to the VM instances and data in their administrative domain, and provide additional details, proofs and performance evaluation.…”
Section: Secure Storagementioning
confidence: 99%
See 1 more Smart Citation
“…Earlier work in [19], [20] described interoperable solutions towards trusted VM launch and storage protection in IaaS. We extend them to create an integrated framework that builds a trust chain from the domain manager to the VM instances and data in their administrative domain, and provide additional details, proofs and performance evaluation.…”
Section: Secure Storagementioning
confidence: 99%
“…, CH n }. We denote a VM instance vm The Security Profile (SP ) , defined in [19], is a function of the verified and measured deployment of a trusted computing base -a collection of software components measurable during a platform boot. Measurements are maintained in protected storage, usually located on the same platform.…”
Section: System Modelmentioning
confidence: 99%
“…During regular operation, VM instances may benefit from additional security services. One example is launch on verified platforms [15], to ensure that the VM instance runs on a host which has not been compromised. Another such example is providing instances with high quality pool of entropy, which is needed for cryptographic operations performed on the VM image to confidentiality and integrity protect the e-health data processed by the instance.…”
Section: B the Way Forwardmentioning
confidence: 99%
“…The remote attestation involves obtaining a quote of the compute host's T P M platform configuration registers to evaluate whether the platform can be trusted. We leave out the minutiae of remote attestation and evaluation of platform trust level and refer the reader to [16].…”
Section: Domain Accessmentioning
confidence: 99%
“…After generating the symmetric key for Dom i k , T T P seals it to the trusted configuration of the compute host (similar to the key sealing procedures already described in [10,16]) and returns to SC the response shown in Figure 5.…”
Section: Domain Accessmentioning
confidence: 99%