Advertisement

An Improved Design of the Trustworthiness Authentication Mechanism of IaaS

  • Xu Wu
  • Xiaqing Xie
  • Chuanyi Liu
  • Chunwen Li
Part of the Communications in Computer and Information Science book series (CCIS, volume 320)

Abstract

By improving resource utilization, cloud computing can greatly save costs and get users considerable profit. However, security issues have emerged as one of the most significant barrier to faster and more widespread adoption of cloud computing. Therefore, this paper focused on the trustworthiness of infrastructure as a service (IaaS) and designed a role-based authentication trustworthiness mechanism to ensure that the different roles in IaaS architecture are trusted. What’s more, this paper also considered the interactions between different roles in cloud environment and designed relevant validation protocols. At last, we also designed some benchmarks to evaluate the performance overhead of this mechanism and the results showed the costs can be very little to be neglected.

Keywords

trusted computing IaaS trustworthiness authentication mechanism 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Goyal, A., Dadizadeh, S.: A Survey on Cloud Computing. University of British Columbia Technical Report for CS 508 (2009)Google Scholar
  2. 2.
    Bertholon, B., Varrette, S., Bouvry, P.: Certicloud: a novel tpm-based approach to ensure cloud iaas security. In: Proceedings of the 4th International Conference on Cloud Computing (CLOUD 2011), July 4-9, IEEE Computer Society, Washington DC (2011)Google Scholar
  3. 3.
    Ruan, A., Martin, A.: RepCloud: Achieving Fine-grained Cloud TCB Attestation with Reputation Systems. In: Proceedings of the 6th ACM Workshop on Scalable Trusted Computing, New York, NY, USA, pp. 3–14 (2011)Google Scholar
  4. 4.
    Wallom, D., Turilli, M., Taylor, G., Hargreaves, N., Martin, A., Raun, A., McMoran, A.: myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Management. In: Proceedings of the 3th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2011), Athens, Greece, November 29-December 1, pp. 247–254 (2011)Google Scholar
  5. 5.
    Santos, N., Gummadi, K.P., Rodrigue, R.: Towards Trusted Cloud Computing. In: Proc.of the 1st USENIX Workshop on Hot Topics in Cloud Computing, Berkeley, CA, USA (2009)Google Scholar
  6. 6.
    Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and Privacy Challenges in Cloud Computing Environments. Technical Report (2010)Google Scholar
  7. 7.
    Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and Privacy Challenges in Cloud Computing Environments. Technical Report (2010)Google Scholar
  8. 8.
    2012 Eucalyptus Systems, Inc., http://open.eucalyptus.com
  9. 9.
  10. 10.
    Trusted Computing Group, http://www.trustedcomputinggroup.org/
  11. 11.
    David, S., Mimi, Z., Reiner, S.: Using IMA for Integrity Measurement and Attestation. In: Linux Plumbers Conference (2009)Google Scholar
  12. 12.
  13. 13.
    2012 Rackspace, US Inc.The OpenStack Project, http://www.openstack.org/
  14. 14.
    OpenNebula Project Leads (OpenNebula.org), http://opennebula.org/
  15. 15.
  16. 16.
    Wikimedia Foundation, Inc., http://en.wikipedia.org/wiki/Nonce
  17. 17.
    Bytemark Hosting, http://www.bytemark.co.uk/

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Xu Wu
    • 1
    • 2
    • 3
  • Xiaqing Xie
    • 1
    • 2
  • Chuanyi Liu
    • 1
  • Chunwen Li
    • 1
    • 2
  1. 1.Key Laboratory of Trustworthy Distributed Computing and Service (BUPT)Ministry of EducationBeijingChina
  2. 2.School of Computer ScienceBeijing University of Posts and TelecommunicationsBeijingChina
  3. 3.Beijing University of Posts and Telecommunications LibraryBeijingChina

Personalised recommendations