Authors:
Mudassar Aslam
1
;
Christian Gehrmann
1
;
Lars Rasmusson
1
and
Mats Björkman
2
Affiliations:
1
Swedish Institute of Computer Science, Sweden
;
2
Mälardalens Högskola, Sweden
Keyword(s):
Security, Trusted Computing, Virtualization, Cloud Computing, IaaS.
Related
Ontology
Subjects/Areas/Topics:
Cloud Computing
;
Cloud Risk, Challenges, and Governance
;
Fundamentals
;
Information and Systems Security
;
Service and Systems Design and Qos Network Security
;
Services Science
Abstract:
In this paper we consider the Infrastructure-as-a-Service (IaaS) cloud model which allows cloud users to run their own virtual machines (VMs) on available cloud computing resources. IaaS gives enterprises the possibility to outsource their process workloads with minimal effort and expense. However, one major problem with existing approaches of cloud leasing, is that the users can only get contractual guarantees regarding the integrity of the offered platforms. The fact that the IaaS user himself or herself cannot verify the provider promised cloud platform integrity, is a security risk which threatens to prevent the IaaS business in general. In this paper we address this issue and propose a novel secure VM launch protocol using Trusted Computing techniques. This protocol allows the cloud IaaS users to securely bind the VM to a trusted computer configuration such that the clear text VM only will run on a platform that has been booted into a trustworthy state. This capability builds us
er confidence and can serve as an important enabler for creating trust in public clouds. We evaluate the feasibility of our proposed protocol via a full scale system implementation and perform a system security analysis.
(More)