Skip to main content

A Software Architecture for Introducing Trust in Java-Based Clouds

  • Conference paper
Secure and Trust Computing, Data Management and Applications (STA 2011)

Abstract

The distributed software paradigms of grid and cloud computing offer massive computational power at commodity prices. Unfortunately, a number of security risks exist. In this paper we propose a software architecture which leverages the Trusted Computing principle of Remote Attestation to assess the trustworthiness of nodes in computing clouds. We combine hardware-security based on the Trusted Platform Module and Intel Trusted Execution Technology with an integrity-guaranteeing virtualization platform. Cloud services are offered by an easy-to-use Java middleware that performs role based access control and trust decisions hidden from the developer.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chadwick, D.W., Zhao, G., Otenko, S., Laborde, R., Su, L., Nguyen, T.A.: Permis a modular authorization infrastructure. Concurrency and Computation: Practice and Experience 20(11), 1341–1357 (2008)

    Article  Google Scholar 

  2. Cooper, A., Martin, A.: Towards a secure, tamper-proof grid platform. In: Cluster Computing and the Grid, CCGRID 2006 (2006)

    Google Scholar 

  3. Daniele Catteddu, G.H.: Cloud Computing benefits, risks and recommendations for information security. Tech. rep., ENISA (2009)

    Google Scholar 

  4. Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the grid: Enabling scalable virtual organizations. Int. J. High Perform. Comput. Appl. 15(3), 200–222 (2001)

    Article  Google Scholar 

  5. Getov, V., von Laszewski, G., Philippsen, M., Foster, I.T.: Multiparadigm commu-nications in java for grid computing. Commun. ACM 44(10), 118–125 (2001)

    Article  Google Scholar 

  6. Grawrock, D.: Dynamics of a Trusted Platform: A Building Block Approach, Richard Bowles. Intel Press, Hillsboro (2009) ISBN 978-1934053171

    Google Scholar 

  7. Löhr, H., Ramasamy, H.V., Sadeghi, A.-R., Schulz, S., Schunter, M., Stüble, C.: Enhancing grid security using trusted virtualization. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 372–384. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Mao, W., Martin, A., Jin, H., Zhang, H.: Innovations for grid security from trusted computing. In: Security Protocols, pp. 132–149 (2009)

    Google Scholar 

  9. Ivanov, N., Setrakyan, D.: GridGain (2010), http://www.gridgain.com

  10. Pirker, M., Toegl, R., Hein, D., Danner, P.: A PrivacyCA for anonymity and trust. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 101–119. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  11. Toegl, R., Pirker, M., Gissing, M.: acTvSM: A dynamic virtualization platform for enforcement of application integrity. In: INTRUST 2011. LNCS. Springer, Heidelberg (in print, 2011)

    Google Scholar 

  12. Toegl, R., Winkler, T., Nauman, M., Hong, T.: Towards platform-independent trusted computing. In: Xu, S., Asokan, N., Nita-Rotaru, C., Seifert, J.P. (eds.) STC, ACM, New York (2009)

    Google Scholar 

  13. Trusted Computing Group: TCG TPM specification version 1.2 revision 103 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Podesser, S., Toegl, R. (2011). A Software Architecture for Introducing Trust in Java-Based Clouds. In: Park, J.J., Lopez, J., Yeo, SS., Shon, T., Taniar, D. (eds) Secure and Trust Computing, Data Management and Applications. STA 2011. Communications in Computer and Information Science, vol 186. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22339-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22339-6_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22338-9

  • Online ISBN: 978-3-642-22339-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics