including malicious insiders, the risk for data loss and
leakage, and account or service hijacking. They sur-
vey current work addressing these threats, i.e. (Con-
standache et al., 2008; Descher et al., 2009; Baldwin
et al., 2009). With respect to the threat of insiders, the
listed solutions only address the task of locking out
the provider. The main purpose of our solution is to
provide an environment that restores some power to
the provider by offering her a versatile tool to, in a
controlled way, inspect the client at run time.
5.2 Contribution
Our contribution is to develop a cloud architec-
ture and proof-of-concept prototype implementation
that (under the Trusted Computing assumptions) can
prove to the client that no eaves-dropping software is
or can be installed on the resource computer.
The cloud administrators’ lost supervisory powers
are partially compensated with a generic tool (probe
inlining) in which invasive checks and enforcement of
the client’s VM for detection and thwarting of dan-
gerous activities can be implemented. The plan is
that probes for botnets, viruses, and cloud infrastruc-
ture attacks will be implemented in this framework,
but specific probes have not been the focus of our
current work. Probes are installed on a fine-grained
per-instruction level meaning they are always on, and
the probes cannot be accessed or circumvented in any
way by the client’s software.
The idea to only let cloud system admins install
software probes into the clients’ VMs instead of hav-
ing full access to a machine is new. Our approach for
doing that, JIT machine code translation is not new,
but our approach of translating it into an intermediary
compilation format that enables mixing in high level
probing functions, and to optimize entire basic blocks
rather than individual instructions, is to our knowl-
edge not found elsewhere.
We also have contributed a TPM based archi-
tecture in which policies that determine the extent
of probing first are negotiated between provider and
client, and later provably enforced by the cloud soft-
ware.
We have presented a security analysis to highlight
the strengths and limitations of the security provided
by this cloud architecture.
The current work consists of the architecture for
the runtime system for the probes, and does not
yet provide any specific language for declaratively
defining probes. Defining concrete probes for actual
threats remains an issue for future work.
ACKNOWLEDGEMENTS
We wish to thank Christian Gehrmann at SICS and
Andrs Mhes and Rolf Blom at Ericsson for thoughtful
comments and critique. Special thanks to Andrs for
providing, configuring and thoroughly locking down
the GEP3 board and Xen. We also wish to thank the
anonymous reviewers for their helpful comments.
REFERENCES
Bala, V., Duesterwald, E., and Banerjia, S. (2000). Dy-
namo: a transparent dynamic optimization system. In
Proceedings of the ACM SIGPLAN 2000 Conference
on Programming Language Design and Implementa-
tion, PLDI ’00, pages 1–12, New York, NY, USA.
ACM. http://doi.acm.org/10.1145/349299.349303.
Baldwin, A., Dalton, C., Shiu, S., Kostienko, K., and Ra-
jpoot, Q. (2009). Providing secure services for a vir-
tual infrastructure. SIGOPS Oper. Syst. Rev., 43:44–
51. http://doi.acm.org/10.1145/1496909.1496919.
Barham, P., Dragovic, B., Fraser, K., Hand, S., Har-
ris, T., Ho, A., Neugebauer, R., Pratt, I., and
Warfield, A. (2003). Xen and the art of virtu-
alization. SIGOPS Oper. Syst. Rev., 37:164–177.
http://doi.acm.org/10.1145/1165389.945462.
Berger, S., C
´
aceres, R., Pendarakis, D., Sailer, R., Valdez,
E., Perez, R., Schildhauer, W., and Srinivasan, D.
(2008). TVDc: managing security in the trusted vir-
tual datacenter. SIGOPS Oper. Syst. Rev., 42:40–47.
http://dx.doi.org/10.1145/1341312.1341321.
Bruening, D. L. (2004). Efficient, transparent,
and comprehensive runtime code manipu-
lation. PhD thesis, Massachusetts Insti-
tute of Technology, Cambridge, MA, USA.
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10
.1.1.68.7639.
Bungale, P. P. and Luk, C.-K. (2007). PinOS: A pro-
grammable framework for whole-system dynamic in-
strumentation. In Proceedings of the 3rd interna-
tional conference on Virtual execution environments,
VEE ’07, pages 137–147, New York, NY, USA. ACM.
http://doi.acm.org/10.1145/1254810.1254830.
Christodorescu, M., Sailer, R., Schales, D. L., Sgan-
durra, D., and Zamboni, D. (2009). Cloud
security is not (just) virtualization security: a
short paper. In Proceedings of the 2009 ACM
Workshop on Cloud Computing Security, CCSW
’09, pages 97–102, New York, NY, USA. ACM.
http://doi.acm.org/10.1145/1655008.1655022.
Constandache, I., Yumerefendi, A., and Chase, J. (2008).
Secure control of portable images in a virtual
computing utility. In Proceedings of the 1st
ACM workshop on Virtual machine security, VM-
Sec ’08, pages 1–8, New York, NY, USA. ACM.
http://doi.acm.org/10.1145/1456482.1456484.
Descher, M., Masser, P., Feilhauer, T., Tjoa, A. M., and
Huemer, D. (2009). Retaining data control to the
PROTECTINGPRIVATEDATAINTHECLOUD
11