Comprehensive Report on Trusted Cloud Computing and Security in IaaS

Verified

Added on  2023/01/23

|10
|648
|46
Report
AI Summary
This report delves into the realm of trusted cloud computing, addressing crucial concerns regarding the confidentiality and integrity of data within cloud environments. It proposes the design of a Trusted Cloud Computing Platform (TCCP) to enhance Infrastructure as a Service (IaaS) offerings, such as Amazon EC2, by providing a secure, closed-box execution environment. This approach ensures the confidential execution of guest virtual machines and allows users to verify the security of the service before deploying their virtual machines. The report highlights the benefits of TCCP in mitigating security threats, particularly those related to data breaches and loss of control, which often deter companies from adopting cloud services. It also explores the architecture and functionalities of TCCP, including its ability to protect the integrity of virtual machines over time. By presenting a comprehensive analysis of TCCP, the report aims to contribute to the advancement of secure and reliable cloud computing solutions.
Document Page
SOFTWARE ENGINEERING
METHODOLOGY
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
This article discusses regarding the
infrastructure of cloud computing
This is done by outsourcing the
computations that are in demand [4]
. Companies are allowed to reduce the IT
costs with the help of offloading
For maintaining confidentiality, the
customers of cloud services might carry
out encryption
Document Page
Infrastructure as a Service
(IaaS)
Various myriads of
cloud providers provide
services at numerous
layers belonging to the
software stack
The main issue in
guaranteeing the
privacy of the
computations increases
for the services that are
present in the higher
layers of software stack Image 1:
IaaS
(source: [1])
Document Page
Attack model
A sysadmin can perpetrate numerous
attacks for accessing the memory of the
virtual machine
Sysadmin would be able to install as well
as execute all types of software in order
to perform any attack [5]
If Xen is utilized in the backend, it allows
a particular sysadmin to run a particular
user level processes in Dom ()
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Trusted computing
Trusted computing
group had proposed a
specific set of hardware
as well as software
TPM has a particular
endorsement private
key
The manufacturers sign
corresponding public key
for guaranteeing the
correctness of chip as
well as validity of a
specific key
Image 2:
IaaS
(source: [2])
Document Page
Trusted computing
During the boot time, the host helps in
computing a specific list of measurement
The ML is usually stored in the TMP of
host
Terra deals with implementing a thin VMM
which enforces a particular execution
environment [2]
The VMM provides guarantee of its
integrity till the machine reboots
Document Page
Trusted cloud computing
platform
The TCCP enhances
the back ends of IaaS
Every node of
backend runs a
particular TVMM
which hosts the
virtual machine of
the customers
The TVMM aims in
protecting its
integrity over time Image 3: cloud
computing platforms
(source: [3])
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Conclusion
This particular paper argues regarding
the concerns of confidentiality and
integrity of data
This paper presents a specific design of a
particular cloud computing platform that
is mostly trusted and which enables the
IaaS services like Amazon EC2 [6]
TCCP provides execution of the guest
virtual machines in a confidential manner
Document Page
References
[1] N., Santos, K.P. Gummadi, and R., Rodrigues. Towards Trusted Cloud
Computing. HotCloud, 9(9), p.3. 2009
[2] A., Botta, W., De Donato, V. Persico, and A., Pescapé. Integration of
cloud computing and internet of things: a survey. Future generation
computer systems, 56, pp.684-700. 2016
[3] M.A., Khan. A survey of security issues for cloud computing. Journal of
network and computer applications, 71, pp.11-29. 2016
[4] A., Maarouf, A. Marzouk, and A., Haqiq, March. Towards a trusted third
party based on multi-agent systems for automatic control of the quality of
service contract in the cloud computing. In 2015 International Conference
on Electrical and Information Technologies (ICEIT) (pp. 311-315). IEEE. 2015
[5] Z., Liu, Y., Li, J., Huang, X. Cheng, and C., Shen. DivORAM: Towards a
practical oblivious RAM with variable block size. Information Sciences, 447,
pp.1-11.
[6]Adjei, J.K., 2015. Explaining the role of trust in cloud computing
services. info, 17(1), pp.54-67. 2018
Document Page
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]