cloud providers. This work suffers from a set of
limitations that RaaS overcomes by design: (1) they
do not consider the validity of the benchmarking
results when possibly dealing with malicious cloud
providers, (2) the performance measurements
produced represent a snapshot in time and hence
they are affected by variations in customer’s
workloads or by any modification in the software,
hardware, or network infrastructure, (3) they
represent a client-side estimate of the provider’s
performance and (4) they do not consider any
security evaluation metric which we believe is a
major requirement that should be considered when
selecting a cloud provider.
A considerable amount of research work has
dealt with the design and implementation of secure
cryptographic coprocessors. The secure crypto
coprocessor concept was firstly introduced by Best
(1980). The advancements in physical security
mechanisms and packaging technology (Weingart,
1987) and the assortment of secure applications that
can be implemented on top of physically secure
coprocessors (Tygar and Yee, 1994) was a major
driving force to a prosperous commercial market.
IBM was the leader on this front by providing a set
of successful implementations meeting the strictest
FIPS 140 security standards. This is represented in
the IBM 4758 PCI cryptographic coprocessor (Dyer,
et al., 2001) and the IBM 4764 PCIX cryptographic
coprocessor (PCIXCC) (Arnold and Doorn, 2004).
The IBM coprocessor product family was the first to
meet the FIPS level 4 security standard based on its
tamper-resistance and tamper-responding
mechanisms. Moreover, Gutmann (2000) presented
a general-purpose open-source crypto coprocessor
that provides competitive performance and higher
functionality compared to commercial products at a
cost of one to two orders of magnitude lower.
7 CONCLUSIONS AND FUTURE
EXTENSIONS
In this paper we presented RaaS, a set of
accountable reputation ranking schemes for service
providers in cloud computing architectures. RaaS
builds on a set of integrity-assurance mechanisms
and protocols to provide a secure execution
environment for supporting the reputation
calculation. Dedicated light-weight performance
evaluation protocols are established to secure the
event log generation and storage mechanisms. A
prototype implementation of the various RaaS
algorithms and protocols is tested on the VMware
vSphere 4 cloud computing operating system. The
incorporation of the RaaS protocols added negligible
overhead to the overall system performance.
Future extensions will include: augmenting a
more comprehensive description of the reputation
protocols, devising a cumulative reputation score
calculation mechanism, and extending the system
simulation with a set of stochastic load and stress
factors.
REFERENCES
Itani, W., Kayssi, A. and Chehab, A., 2009. Privacy as a
Service: Privacy-Aware Data Storage and Processing
in Cloud Computing Architectures. In DASC’09.
Tygar, J. and Yee, B., 1994. Dyad: A system for using
physically secure coprocessors. In IP Workshop.
Weingart, S., 1987. Physical security for the mABYSS
system. In IEEE Computer Society Conf. on Security
and Privacy.
Schneier, B. and Kelsey, J., 1999. Secure audit logs to
support computer forensics. ACM Transactions on
Information and System Security, 1(3), pp.159-196.
Mármol, F. and Pérez, G., 2009. Security threats scenarios
in trust and reputation models for distributed systems.
Computers and Security, 28(7), pp.545-556.
Malik, Z. and Bouguettaya, A., 2009. RATEWeb:
reputation assessment for trust establishment among
web services. VLDB Journal, 18(4), pp.885–911.
Chang, E., Dillon, T. and Hussain, F., 2006. Trust and
reputation for service-oriented environments. Wiley.
Hwang, K., Kulkareni, S. and Hu, Y., 2009, Cloud
Security with Virtualized Defense and Reputation-
Based Trust Management. In DASC’09.
Lim, S., Keung, C. and Griffiths, N., 2010. Trust and
Reputation. In Springer Agent-Based Service-Oriented
Computing.
Haeberlen, A., 2009. A Case for the Accountable Cloud.
In LADIS.
Li, A., Yang, X., Kandula, S. and Zhang, M., 2010.
CloudCmp: Shopping for a Cloud Made Easy. In
HotCloud'10.
Best, R., 1980. Preventing Software Piracy with Crypto-
Microprocessors. In COMPCON 80.
Dyer, J., Lindemann, M., Perez, R., Sailer, R., Smith, S.,
Doorn, L. and Weingart, S., 2001. Building the IBM
4758 secure coprocessor. IEEE Computer.
Arnold, T., Van Doorn, L., 2004. The IBM PCIXCC: A
new cryptographic coprocessor for the IBM eServer.
IBM Journal of Research and Development, 48(3),
pp.475.
Gutmann, P., 2000. An Open-source Cryptographic
Coprocessor. In the 9th USENIX Security Symposium.
ACCOUNTABLE REPUTATION RANKING SCHEMES FOR SERVICE PROVIDERS IN CLOUD COMPUTING
55