𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[ACM Press the 3rd ACM workshop - Chicago, Illinois, USA (2011.10.21-2011.10.21)] Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW '11 - Trusted platform-as-a-service

✍ Scribed by Brown, Andrew; Chase, Jeffrey S.


Book ID
121672726
Publisher
ACM Press
Year
2011
Tongue
English
Weight
481 KB
Category
Article
ISBN
1450310044

No coin nor oath required. For personal study only.

✦ Synopsis


The applications we use are increasingly packaged as network services running in the cloud under the control of a service provider. Users of these services have no basis to determine if these services are trustworthy, beyond the assurances of the service provider. Our work addresses the problem of how to build support for trustworthy services in the cloud, within the context of a larger trust management framework.This paper shows how users can gain insights and trust into service applications by leveraging trust in a neutral third party: a cloud provider that hosts application services on an infrastructure and platform that it controls. A trusted cloud provider may act as a root of trust to attest cloudhosted services to their clients-a trusted platform cloud. We have prototyped this approach in a trusted platform-asa-service cloud provider supporting a Python/Django web framework. The cloud provider seals instances of service applications and attests their Python source code to external users. Once launched and attested, service instances run with an independent identity and are isolated from tampering by the cloud customer, except through well-defined operator interfaces that are part of the service definition.


πŸ“œ SIMILAR VOLUMES


[ACM Press the 3rd ACM workshop - Chicag
✍ Xu, Yunjing; Bailey, Michael; Jahanian, Farnam; Joshi, Kaustubh; Hiltunen, Matti πŸ“‚ Article πŸ“… 2011 πŸ› ACM Press 🌐 English βš– 595 KB

Recent exploration into the unique security challenges of cloud computing have shown that when virtual machines belonging to different customers share the same physical machine, new forms of cross-VM covert channel communication arise. In this paper, we explore one of these threats, L2 cache covert