Abstract
To become a more popular cloud service, it is necessary to dynamically provision virtualized infrastructure resources and to automatically deploy and optimize workloads based on the state of the workload or the state of the entire infrastructure resource. However, in a cloud-based virtualization infrastructure, when multiple VMs work together to provide a customized virtualized network security service, existing debugging and profiling tools can no longer be used as performance measures or integrity verification tools. In order to solve these drawbacks, a tracing method is used. In the tracing, necessary information is simultaneously recorded with minimal overhead while executing the program. In this paper, we proposed a scheme to guarantee the integrity of the software that composes the VM in the cloud environment using Intel processor trace (PT).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Paxton NC (2016) Cloud security: a review of current issues and proposed solutions. In: International conference on collaboration and internet computing (CIC), pp 452–455
Mahboob T, Zahid M, Ahmad G (2016) Adopting information security techniques for cloud computing—a survey. In: International conference on information technology, information systems and electrical engineering (ICITISEE), pp 7–11
Thalheim J, Bhatotia P, Fetzer C (2016) INSPECTOR: data provenance using intel processor trace (PT). In: International conference on distributed computing systems (ICDCS), pp 25–34
Makkaoui KE, Ezzati A, Beni-Hssane A, Motamed C (2016) Cloud security and privacy model for providing secure cloud services. In: 2016 2nd international conference on cloud computing technologies and applications (CloudTech), pp 81–86
Duncan B, Bratterud A, Happe A (2016) Enhancing cloud security and privacy: time for a new approach? In: International conference on innovative computing technology (INTECH), pp 110–115
Lai S-F, Su H-K, Hsiao W-H, Chen K-J (2016) Design and implementation of cloud security defense system with software defined networking technologies. In: International conference on information and communication technology convergence (ICTC), pp 292–207
Kleen A, Simple Intel CPU processor tracing on Linux. https://github.com/andikleen/simple-pt
Acknowledgement
This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (No. 2016-0-00078, Cloud-based Security Intelligence Technology Development for the Customized Security Service Provisioning).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media Singapore
About this paper
Cite this paper
Kim, H., Kim, Y., Kim, I., Kim, H. (2018). Dynamic Information Extraction and Integrity Verification Scheme for Cloud Security. In: Kim, K., Joukov, N. (eds) Mobile and Wireless Technologies 2017. ICMWT 2017. Lecture Notes in Electrical Engineering, vol 425. Springer, Singapore. https://doi.org/10.1007/978-981-10-5281-1_46
Download citation
DOI: https://doi.org/10.1007/978-981-10-5281-1_46
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5280-4
Online ISBN: 978-981-10-5281-1
eBook Packages: EngineeringEngineering (R0)