Experiences in Trusted Cloud Computing

被引:3
|
作者
Oliver, Ian [1 ]
Holtmanns, Silke [1 ]
Miche, Yoan [1 ]
Lal, Shankar [1 ]
Hippelainen, Leo [1 ]
Kalliola, Aapo [1 ]
Ravidas, Sowmya [1 ]
机构
[1] Secur Res Grp, Nokia Bell Labs, Espoo, Finland
来源
NETWORK AND SYSTEM SECURITY | 2017年 / 10394卷
关键词
NFV; Trusted computing; Security; Telecommunications; Cloud;
D O I
10.1007/978-3-319-64701-2_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While trusted computing is a well-known technology, its role has been relatively limited in scope and typically limited to single machines. The advent of cloud computing, its role as critical infrastructure and the requirement for trust between the users of computing resources combines to form a perfect environment for trusted and high-integrity computing. Indeed, the use of trusted computing is an enabling technology over nearly all 'cyber' areas: secure supply chain management, privacy and critical data protection, data sovereignty, cyber defense, legal etc. To achieve this, we must fundamentally redefine what we mean by trusted and high-integrity computing. We are required to go beyond boot-time trust and rethink notions of run-time trust, partial trust, how systems are constructed, the trust between management and operations, compute and storage infrastructure and the dynamic provisioning of services by external parties. While attestation technologies, so-called run-time trust and virtualized TPM are being brought to the fore, adopting these does not solve any of the fundamental problems of trust in the cloud.
引用
收藏
页码:19 / 30
页数:12
相关论文
共 50 条
  • [1] Experiences in Trusted Cloud Computing
    [J]. Oliver, Ian (ian.oliver@nokia-bell-labs.com), 2018, River Publishers (06):
  • [2] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
  • [3] Trusted Computing Strengthens Cloud Authentication
    Ghazizadeh, Eghbal
    Zamani, Mazdak
    Ab Manan, Jamalul-Lail
    Alizadeh, Mojtaba
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [4] Toward a Trusted framework for Cloud Computing
    Toumi, Hicham
    Talea, Mohamed
    Sabiri, Khadija
    Eddaoui, Ahmed
    [J]. 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 361 - 366
  • [5] The Trusted Computing exemplary with Astonishing Security for Cloud Computing
    Devi, Ramya M.
    Balamurugan, P. S.
    Thanushkodi, K.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 206 - 209
  • [6] Cloud-DLS: Dynamic trusted scheduling for Cloud computing
    Wang, Wei
    Zeng, Guosun
    Tang, Daizhong
    Yao, Jing
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (03) : 2321 - 2329
  • [7] AN ANONYMOUS REMOTE ATTESTATION FOR TRUSTED CLOUD COMPUTING
    Zhang, Yong
    Li, Xiangxue
    Qian, Haifeng
    [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 426 - 429
  • [8] Trusted Platforms to secure Mobile Cloud Computing
    Thinh Le Vinh
    Bouzefrane, Samia
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 1068 - 1075
  • [9] Defending of Trusted Access Control in Cloud Computing
    Mandhala, Venkata Naresh
    Chinnam, Siva Koteswara Rao
    Kim, Tai-hoon
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 163 - 166
  • [10] Threshold remote attestation on trusted cloud computing
    Zhao, Yong
    Xue, Fei
    Zhang, Yanxue
    [J]. Journal of Applied Sciences, 2013, 13 (09) : 1592 - 1596