UO CIS 607 - Towards Trusted Cloud Computing

Unformatted text preview:

Towards Trusted Cloud ComputingAuthors: Nuno Santos, Krishna P. Gummadi, and Rodrigo RodriguesIntroductionCreation of trustEncryptionTerraPrevents owner of physical host from interfering with or inspecting a running computationDetermines if computation is running in a trusted environment.Works on a VM running in a single host.Trusted Cloud Computing Platform OverviewProvides abstraction of closed box execution environmentAllows a user to check whether the virtual machine is running securelyEucalyptusManages 1+ clusters made of nodes running VMMs to hostcustomers' VMsCloud ManagerImage loaded into CMLaunchedExports administrative toolsAdding/removing VMI's and usersXen supports live migrationAttack ModelSystems administratorRun user level processes at Dom0Physical accessSingle sysadmin with root privileges?Assume they can login with root privilegesPhysical access?Divert the VM to a machine under their control, located outside the security perimeters.TCCP must:Confine the VM execution inside the perimeterSysadmin can't access memory"Trusted Computing"TPM chipEndorsement private key (EK)Remote attestationMeasurement List (ML)NonceTrusted Cloud Computing PlatformTVMMTCManages set of nodes in security perimeter calledtrusted nodesAttests to the node's platformLocated in ETETrusted nodes must:must be in security perimeterrun TVMMWhen to be wary:LaunchingMigrationETEVeriSignNode ManagementTPM holds the public endorsement key of the node and the expected measurement list.The ETE makes the public EK, ML, and indicated trusted keys all safely publicly available.Launching a VMUser does not know which physical node the VM will be launched on and can only trust the TCMigrating a VMNs - source nodeNd - destination nodeBoth must be trustedVM state must remain confidential and


View Full Document

UO CIS 607 - Towards Trusted Cloud Computing

Download Towards Trusted Cloud Computing
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Towards Trusted Cloud Computing and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Towards Trusted Cloud Computing 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?