SECURELY LAUNCHING VIRTUAL MACHINES ON TRUSTWORTHY PLATFORMS IN A PUBLIC CLOUD - An Enterprise’s Perspective

Mudassar Aslam, Christian Gehrmann, Lars Rasmusson, Mats Björkman

Abstract

In this paper we consider the Infrastructure-as-a-Service (IaaS) cloud model which allows cloud users to run their own virtual machines (VMs) on available cloud computing resources. IaaS gives enterprises the possibility to outsource their process workloads with minimal effort and expense. However, one major problem with existing approaches of cloud leasing, is that the users can only get contractual guarantees regarding the integrity of the offered platforms. The fact that the IaaS user himself or herself cannot verify the provider promised cloud platform integrity, is a security risk which threatens to prevent the IaaS business in general. In this paper we address this issue and propose a novel secure VM launch protocol using Trusted Computing techniques. This protocol allows the cloud IaaS users to securely bind the VM to a trusted computer configuration such that the clear text VM only will run on a platform that has been booted into a trustworthy state. This capability builds user confidence and can serve as an important enabler for creating trust in public clouds. We evaluate the feasibility of our proposed protocol via a full scale system implementation and perform a system security analysis.

References

  1. acTvSM (2010). Advanced Cryptographic Trusted Virtual Security Module. http://www.iaik.tugraz.at/content/research/trusted co mputing/actvsm/.
  2. Aslam, M. and Gehrmann, C. (2011). Security Considerations for Virtual Platform Provisioning. In ECIW 7811: Proceedings of the 10th European Conference on Information Warfare and Security, pages 283-290, UK. The Institute of Cybernetics at the Tallinn University of Technology, Academic Publishing Limited.
  3. Berger, S., Cáceres, R., Goldman, K. A., Perez, R., Sailer, R., and van Doorn, L. (2006). vTPM: Virtualizing the Trusted Platform Module. In USENIX-SS'06: Proceedings of the 15th Conference on USENIX Security Symposium, Berkeley, CA, USA. USENIX Association.
  4. Chisnall, D. (2007). The Definitive Guide to the Xen Hypervisor (Prentice Hall Open Source Software Development Series). Prentice Hall PTR, Upper Saddle River, NJ, USA.
  5. CircleID (2009). Survey: Cloud Computing 'No Hype', But Fear of Security and Control Slowing Adoption. http://www.circleid.com/posts/20090226 cloud comp uting hype security/.
  6. Cloud Computing and Security (2010). Cloud Computing and Security - A Natural Match. http://www.trustedcomputinggroup.org/resources/clo ud computing and security a natural match.
  7. CSA Guide (2009). Security guidance for critical areas of focus in cloud computing. http://www.cloudsecurityalliance.org/guidance/csagu ide.v2.1.pdf.
  8. Frankel, S. and Krishnan, S. (2011). IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap. RFC 6071 (Informational).
  9. Gasmi, Y., Sadeghi, A.-R., Stewin, P., Unger, M., and Asokan, N. (2007). Beyond Secure Channels. In STC 7807: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pages 30-40, New York, NY, USA. ACM.
  10. Haldar, V., Chandra, D., and Franz, M. (2004). Semantic Remote Attestation - A Virtual Machine directed approach to Trusted Computing. In USENIX Virtual Machine Research and Technology Symposium, pages 29-41.
  11. Publisher. (2006). TCG Infrastructure Archi-
  12. Jansen, B., Ramasamy, H. V., and Schunter, M. (2006). Flexible Integrity Protection and Verification Architecture for Virtual Machine Monitors. In The Second Workshop on Advances in Trusted Computing (WATC 06 Fall.
  13. Krutz, R. L. and Vines, R. D. (2010). Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley Publishing.
  14. Landfermann, R., Kuhlmann, D., Kuhlmann, D., L, R., Ramasamy, H. V., Ramasamy, H. V., Schunter, M., Schunter, M., Ramunno, G., Ramunno, G., Vernizzi, D., and Vernizzi, D. (2006). D.: An Open Trusted Computing Architecture - Secure Virtual Machines Enabling User-defined Policy Enforcement. www.opentc.net.
  15. Ormandy, T. (2007). An empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments. In CanSecWest.
  16. Rocha, F. and Correia, M. (2011). Lucy in the sky without diamonds: Stealing confidential data in the cloud. Dependable Systems and Networks Workshops, 0:129- 134.
  17. Sailer, R., Zhang, X., Jaeger, T., and van Doorn, L. (2004). Design and implementation of a tcg-based integrity measurement architecture. In Proceedings of the 13th conference on USENIX Security Symposium - Volume 13, SSYM'04, pages 16-16, Berkeley, CA, USA. USENIX Association.
  18. Somorovsky, J., Heiderich, M., and Jensen, M. (2011). All your clouds are belong to us: security analysis of cloud management interfaces. computing security. Architecture Overview (2007). TCG
  19. Threats, C. (2010). Top Threats to Cloud Computing. Technical Report Version 1.0, Cloud Security Alliance.
  20. TMI (2010). TCG Trusted Multi-Tenant Infrastructure. http://www.trustedcomputinggroup.org/developers/tr usted multitenant infrastructure. Commands (2007). TPM Specifica-
  21. TSS (2007). TCG Software Stack (TSS) Specification. http://www.trustedcomputinggroup.org/resources.
  22. Van Doorn, L. (2007). Trusted Computing Challenges. In STC 7807: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pages 1-1, New York, NY, USA. ACM.
  23. Vaquero, L. M., Rodero-Merino, L., and Morán, D. (2011). Locking the sky: a survey on iaas cloud security. Computing, 91:93-118.
Download


Paper Citation


in Harvard Style

Aslam M., Gehrmann C., Rasmusson L. and Björkman M. (2012). SECURELY LAUNCHING VIRTUAL MACHINES ON TRUSTWORTHY PLATFORMS IN A PUBLIC CLOUD - An Enterprise’s Perspective . In Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8565-05-1, pages 511-521. DOI: 10.5220/0003928105110521


in Bibtex Style

@conference{closer12,
author={Mudassar Aslam and Christian Gehrmann and Lars Rasmusson and Mats Björkman},
title={SECURELY LAUNCHING VIRTUAL MACHINES ON TRUSTWORTHY PLATFORMS IN A PUBLIC CLOUD - An Enterprise’s Perspective},
booktitle={Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2012},
pages={511-521},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003928105110521},
isbn={978-989-8565-05-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - SECURELY LAUNCHING VIRTUAL MACHINES ON TRUSTWORTHY PLATFORMS IN A PUBLIC CLOUD - An Enterprise’s Perspective
SN - 978-989-8565-05-1
AU - Aslam M.
AU - Gehrmann C.
AU - Rasmusson L.
AU - Björkman M.
PY - 2012
SP - 511
EP - 521
DO - 10.5220/0003928105110521