a Hypervisor derived from Xen and performs TPM-
based measurements of software.
The UK myTrustedCloud (Wallom et al., 2011)
project studies the integration of an IaaS Cloud plat-
form with KVM-based virtualization and hypervisor
trust mechanisms built upon IBM IMA. Different lev-
els of attestation are provided for the different layers
in the software architecture.
6 CONCLUSIONS AND
OUTLOOK
Our work shows how to join Cloud nodes that are in
a specific, trusted state, into a Cloud computing net-
work.
In our approach we assumed distributed Cloud
nodes, which raises the challenge to physically ma-
nipulate them. Based on Trusted Computing tech-
nologies we presented a protocol which ensures that
nodes joining the Cloud can only do this if they can
attest that they are in a good state. Our approach is
lightweight as it does not come with Trusted Comput-
ing complexities, a simple TXT enabled boot process
is sufficient.
In future work we will examine the modifications
required to the respective platform operating system
to provide a stable measurement chain and explore
which platforms are suited for our architecture.
ACKNOWLEDGEMENTS
We thank the anonymous reviewers for their feed-
back. This work has been supported by the Euro-
pean Commission through project FP7-ICT-SEPIA,
grant agreement number 257433, and project FP7-
SEC-SECRICOM, grant agreement number 218123.
REFERENCES
Berger, S., C´aceres, R., Goldman, K. A., Perez, R., Sailer,
R., and van Doorn, L. (2006). vTPM: virtualizing the
trusted platform module. In USENIX-SS'06: Proceed-
ings of the 15th conference on USENIX Security Sym-
posium, pages 305–320.
Berger, S., C´aceres, R., Pendarakis, D., Sailer, R., Valdez,
E., Perez, R., Schildhauer, W., and Srinivasan, D.
(2008). Tvdc: managing security in the trusted vir-
tual datacenter. SIGOPS Oper. Syst. Rev., 42:40–47.
Brickell, E., Camenisch, J., and Chen, L. (2004). Di-
rect anonymous attestation. In Proceedings of the
11th ACM conference on Computer and communica-
tions security, pages 132–145, Washington DC, USA.
ACM.
Brown, A. and Chase, J. S. (2011). Trusted platform-as-
a-service: a foundation for trustworthy cloud-hosted
applications. In Proceedings of the 3rd ACM work-
shop on Cloud computing security workshop, CCSW
’11, pages 15–20, New York, NY, USA. ACM.
Coker, G., Guttman, J., Loscocco, P., Sheehy, J., and Snif-
fen, B. (2008). Attestation: Evidence and trust. Infor-
mation and Communications Security, pages 1–18.
Grawrock, D. (2009). Dynamics of a Trusted Platform:
A Building Block Approach. Richard Bowles, Intel
Press, Intel Corporation, 2111 NE 25th Avenue, JF3-
330, Hillsboro, OR 97124-5961.
Krautheim, F. J., Phatak, D. S., and Sherman, A. T. (2010).
Introducing the trusted virtual environment module: a
new mechanism for rooting trust in cloud computing.
In Proceedings of the 3rd international conference on
Trust and trustworthy computing, TRUST’10, pages
211–227, Berlin, Heidelberg. Springer-Verlag.
Pirker, M., Toegl, R., Hein, D., and Danner, P. (2009). A
PrivacyCA for Anonymity and Trust. In Chen, L.,
Mitchell, C. J., and Andrew, M., editors, Trust '09:
Proceedings of the 2nd International Conference on
Trusted Computing, volume 5471 of LNCS. Springer
Berlin / Heidelberg.
Podesser, S. and Toegl, R. (2011). A software architecture
for introducing trust in java-based clouds. In Park,
J. J., Lopez, J., Yeo, S.-S., Shon, T., and Taniar, D.,
editors, Secure and Trust Computing, Data Manage-
ment and Applications, volume 186 of Communica-
tions in Computer and Information Science, pages 45–
53. Springer Berlin Heidelberg.
Sadeghi, A.-R. and St¨uble, C. (2004). Property-based attes-
tation for computing platforms: caring about proper-
ties, not mechanisms. In NSPW, pages 67–77.
Santos, N., Gummadi, K. P., and Rodrigues, R. (2009). To-
wards trusted cloud computing. In Proceedings of the
2009 conference on Hot topics in cloud computing,
HotCloud’09, Berkeley, CA, USA. USENIX Associa-
tion.
Tarnovsky, C. (2010). Hacking the Smartcard Chip. In
Blackhat DC.
Trusted Computing Group (2007a). TCG infrastructure
specifications.
Trusted Computing Group (2007b). TCG TPM Specifica-
tion Version 1.2 Revision 103.
Wallom, D., Turilli, M., Taylor, G., Hargreaves, N., Mar-
tin, A., Raun, A., and McMoran, A. (2011). mytrust-
edcloud: Trusted cloud infrastructure for security-
critical computation and data managment. In Proeed-
ings of Cloudcom 2011. in print.
Winter, J. and Dietrich, K. (2011). A Hijacker’s Guide to
the LPC Bus. In EuroPKI 2011 proceedings. in print.
Wojtczuk, R. and Rutkowska, J. (2009). Attacking Intel
Trusted Execution Technology. Technical report, In-
visible Things Lab.
Wojtczuk, R., Rutkowska, J., and Tereshkin, A. (2009).
Another Way to Circumvent Intel Trusted Execution
Technology. Technical report, Invisible Things Lab.
LIGHTWEIGHTDISTRIBUTEDATTESTATIONFORTHECLOUD
585