Development of Design for Enhancing Trust in Cloud’s SPI Stack
Öz
Cloud
computing defines the SPI model, which is generally agreed upon as providing Software-as-a-Service,
Platform-as-a-Service and Infrastructure-as-a-Service. Interest in those
service delivery models is growing because the paradigm offers to cloud
customers high computational resource on-demand with a low cost. However,
trustiness in the cloud services regarding the security and the privacy of the
delivered data is the most critical issue in the SPI model. In this paper we
propose a trusted SPI model that gives cloud customer more confidence into SPI
services by leveraging a trust in a neutral SPI certifying authority. The
proposed model prevents insider attacks from tampering with application service
before and after the computational resource was launched and allow cloud
customer to verify if its node run in a secure environment
Anahtar Kelimeler
Kaynakça
- Ron Zalkind. Protecting Your Data in Google Docs Compliance In The Cloud. http://hosteddocs.ittoolbox.com/protecting-your-data-in-google-docs.pdf.
- N. Santos, K. P. Gummadi, and R. Rodrigues. Towards trusted cloud computing. In Proceedings of the Workshop on Hot Topics in Cloud Computing, HotCloud’09. USENIX Association, 2009. http://portal.acm.org/citation.cfm?id=1855533.1855536.
- Lina Jia, Min Zhu, and Bibo Tu. 2017. T-VMI: Trusted Virtual Machine Introspection in Cloud Environments. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid '17). IEEE Press, Piscataway, NJ, USA, 478-487. DOI: https://doi.org/10.1109/CCGRID.2017.48
- https://trustedcomputinggroup.org/tpm-main-specification/
- Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh. 2003. Terra: a virtual machine-based platform for trusted computing. In Proceedings of the nineteenth ACM symposium on Operating systems principles (SOSP '03). ACM, New York, NY, USA, 193-206. DOI=http://dx.doi.org/10.1145/945445.945464
- Krautheim F.J., Phatak D.S., Sherman A.T. (2010) Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing. In: Acquisti A., Smith S.W., Sadeghi AR. (eds) Trust and Trustworthy Computing. Trust 2010. Lecture Notes in Computer Science, vol 6101. Springer, Berlin, Heidelberg. DOI: https://doi.org/10.1007/978-3-642-13869-0_14
- Li B., Lv S., Zhang Y., Tian M. (2014) The Application of Trusted Computing Technology in the Cloud Security. In: Wong W.E., Zhu T. (eds) Computer Engineering and Networking. Lecture Notes in Electrical Engineering, vol 277. Springer, Cham. DOI : https://doi.org/10.1007/978-3-319-01766-2_99
- National Institute of Standards and Technology (NIST) FIPS PUB 186-4, Digital Signature Standard (DSS). DOI: http://dx.doi.org/10.6028/NIST.FIPS.186.4
Ayrıntılar
Birincil Dil
İngilizce
Konular
Mühendislik
Bölüm
Araştırma Makalesi
Yazarlar
Ahmed Bentajer
Türkiye
Mustapha Hedabou
Bu kişi benim
Morocco
Faouzia Ennaama
Bu kişi benim
Said Elfezazi
Bu kişi benim
Morocco
Yayımlanma Tarihi
31 Mart 2020
Gönderilme Tarihi
25 Aralık 2017
Kabul Tarihi
9 Mart 2020
Yayımlandığı Sayı
Yıl 2020 Cilt: 6 Sayı: 1