cloud stakeholders. In addition, we have designed a
complete software architecture needed to run the pro-
tocol and protect the VM data. Our protocol enables
technical trust which allows cloud users to validate
the security guarantees given by the cloud provider
before using the provisioned service. We also imple-
mented the designed protocol to evaluate its feasibil-
ity in terms of implementation effort and complex-
ity. Finally, we performed security analysis to val-
idate that all security requirements are fulfilled and
all identified threats have been addressed comprehen-
sively. In our analysis, we showed how a user VM can
strongly be bounded to a particular platform to ful-
fill users’ security requirements. However, this strong
binding also limits the flexibility with respect to load
management, platform upgrade, etc. These limita-
tions can be reduced by adding trusted VM migration
mechanism to the solution. Our suggested architec-
ture allows opportunities for such extensions but the
details are left for future research.
REFERENCES
acTvSM (2010). Advanced Cryptographic
Trusted Virtual Security Module.
http://www.iaik.tugraz.at/content/research/trusted co
mputing/actvsm/.
Aslam, M. and Gehrmann, C. (2011). Security Considera-
tions for Virtual Platform Provisioning. In ECIW ’11:
Proceedings of the 10th European Conference on In-
formation Warfare and Security, pages 283–290, UK.
The Institute of Cybernetics at the Tallinn University
of Technology, Academic Publishing Limited.
Berger, S., C
´
aceres, R., Goldman, K. A., Perez, R., Sailer,
R., and van Doorn, L. (2006). vTPM: Virtualizing the
Trusted Platform Module. In USENIX-SS’06: Pro-
ceedings of the 15th Conference on USENIX Security
Symposium, Berkeley, CA, USA. USENIX Associa-
tion.
Chisnall, D. (2007). The Definitive Guide to the Xen Hyper-
visor (Prentice Hall Open Source Software Develop-
ment Series). Prentice Hall PTR, Upper Saddle River,
NJ, USA.
CircleID (2009). Survey: Cloud Computing ’No Hype’,
But Fear of Security and Control Slowing Adoption.
http://www.circleid.com/posts/20090226 cloud comp
uting hype security/.
Cloud Computing and Security (2010). Cloud
Computing and Security - A Natural Match.
http://www.trustedcomputinggroup.org/resources/clo
ud computing and security a natural match.
CSA Guide (2009). Security guidance for crit-
ical areas of focus in cloud computing.
http://www.cloudsecurityalliance.org/guidance/csagu
ide.v2.1.pdf.
Frankel, S. and Krishnan, S. (2011). IP Security (IPsec) and
Internet Key Exchange (IKE) Document Roadmap.
RFC 6071 (Informational).
Gasmi, Y., Sadeghi, A.-R., Stewin, P., Unger, M., and
Asokan, N. (2007). Beyond Secure Channels. In STC
’07: Proceedings of the 2007 ACM Workshop on Scal-
able Trusted Computing, pages 30–40, New York, NY,
USA. ACM.
Haldar, V., Chandra, D., and Franz, M. (2004). Seman-
tic Remote Attestation - A Virtual Machine directed
approach to Trusted Computing. In USENIX Virtual
Machine Research and Technology Symposium, pages
29–41.
Huang, X. and Peng, Y. (2009). An Effective Approach
for Remote Attestation in Trusted Computing. In
WISA 2009 : Proceedings of the 2nd International
Symposium on Web Information Systems and Applica-
tions, pages 80–83, FIN-90571, OULU, FINLAND.
Academy Publisher.
IMM (2006). TCG Infrastructure Archi-
tecture Part-II - Integrity Management.
http://www.trustedcomputinggroup.org/resources.
Jansen, B., Ramasamy, H. V., and Schunter, M. (2006).
Flexible Integrity Protection and Verification Archi-
tecture for Virtual Machine Monitors. In The Second
Workshop on Advances in Trusted Computing (WATC
06 Fall.
Krutz, R. L. and Vines, R. D. (2010). Cloud Security:
A Comprehensive Guide to Secure Cloud Computing.
Wiley Publishing.
Landfermann, R., Kuhlmann, D., Kuhlmann, D., L, R.,
Ramasamy, H. V., Ramasamy, H. V., Schunter,
M., Schunter, M., Ramunno, G., Ramunno, G.,
Vernizzi, D., and Vernizzi, D. (2006). D.: An Open
Trusted Computing Architecture – Secure Virtual Ma-
chines Enabling User-defined Policy Enforcement.
www.opentc.net.
Ormandy, T. (2007). An empirical Study into the Secu-
rity Exposure to Hosts of Hostile Virtualized Environ-
ments. In CanSecWest.
Rocha, F. and Correia, M. (2011). Lucy in the sky without
diamonds: Stealing confidential data in the cloud. De-
pendable Systems and Networks Workshops, 0:129–
134.
Sailer, R., Zhang, X., Jaeger, T., and van Doorn, L. (2004).
Design and implementation of a tcg-based integrity
measurement architecture. In Proceedings of the 13th
conference on USENIX Security Symposium - Vol-
ume 13, SSYM’04, pages 16–16, Berkeley, CA, USA.
USENIX Association.
Somorovsky, J., Heiderich, M., and Jensen, M. (2011). All
your clouds are belong to us: security analysis of
cloud management interfaces. computing security.
TCG Architecture Overview (2007). TCG
Specification Architecture Overview.
http://www.trustedcomputinggroup.org/resources.
Threats, C. (2010). Top Threats to Cloud Computing. Tech-
nical Report Version 1.0, Cloud Security Alliance.
TMI (2010). TCG Trusted Multi-Tenant Infrastructure.
http://www.trustedcomputinggroup.org/developers/tr
usted multitenant infrastructure.
TPM Commands (2007). TPM Specifica-
tion, TPM Main Part-III Design Principles.
http://www.trustedcomputinggroup.org/resources.
CLOSER2012-2ndInternationalConferenceonCloudComputingandServicesScience
520