Skip to main content

Sentinel: In Case of the Untrustworthy Behaviors Inside the Clouds

  • Conference paper
  • First Online:
Trustworthy Computing and Services (ISCTCS 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 520))

Included in the following conference series:

  • 917 Accesses

Abstract

Since compute cloud is the most important part of IAAS applications, there are a number of security issues associated with it, including the threat from untrustworthy administrators who may compromise the users’ system without authorization and escape responsibility by deleting logs. Based on previous publication, ways to prevent destruction from administrators mainly fall into three broad categories: SSO(Single Sign On), administration rights distribution, log analyzing. However, any of these methods have strengths and weaknesses. In this document, we come up with a new method “Sentinel”, which combines double-check and the log mechanism and can ensure the security of the system without weakening administrators’ privileges. In our Sentinel, the administrators can only enter the management domain through a unified entrance. The Sentinel is able to detect and intersect destructive instruction and at the same time keep operation logs which are transparent to the administrators.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, Q.: Virtualization and cloud computing. PHEI (2011)

    Google Scholar 

  2. Liu, C.: A dynamic trustworthiness verification mechanism for trusted cloud execution environment. J. Softw. (2013)

    Google Scholar 

  3. Jansen, W.: Guidelines on security and privacy in public cloud computing. NIST, Washington, DC (2011)

    Google Scholar 

  4. Zhang, T.: Research and Design of Web-based SSO System. University of Science and Technology of China (2005)

    Google Scholar 

  5. He, D.: The Design and Implementation of SSO System Unrelated with Application. Builetin of Science and Technology (2012)

    Google Scholar 

  6. Li, H.: Research Based on the Fine-grained Access Control. ZhongShan University (2012)

    Google Scholar 

  7. Xu, Y.: The Separation of Three Rights Data Management. ESAS World (2009)

    Google Scholar 

  8. Dunlap, G.: ReVirt. University of Michigan (2008)

    Google Scholar 

  9. Artem Dinaburg.: Ether. Georgia Institute of Technology (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dong Cui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cui, D., Liu, C., Yang, M., Yang, J. (2015). Sentinel: In Case of the Untrustworthy Behaviors Inside the Clouds. In: Yueming, L., Xu, W., Xi, Z. (eds) Trustworthy Computing and Services. ISCTCS 2014. Communications in Computer and Information Science, vol 520. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47401-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47401-3_13

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47400-6

  • Online ISBN: 978-3-662-47401-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics