Skip to main content

Experiences in Trusted Cloud Computing

  • Conference paper
  • First Online:
Book cover Network and System Security (NSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10394))

Included in the following conference series:

Abstract

While trusted computing is a well-known technology, its role has been relatively limited in scope and typically limited to single machines. The advent of cloud computing, its role as critical infrastructure and the requirement for trust between the users of computing resources combines to form a perfect environment for trusted and high-integrity computing. Indeed, the use of trusted computing is an enabling technology over nearly all ‘cyber’ areas: secure supply chain management, privacy and critical data protection, data sovereignty, cyber defense, legal etc. To achieve this, we must fundamentally redefine what we mean by trusted and high-integrity computing. We are required to go beyond boot-time trust and rethink notions of run-time trust, partial trust, how systems are constructed, the trust between management and operations, compute and storage infrastructure and the dynamic provisioning of services by external parties. While attestation technologies, so-called run-time trust and virtualized TPM are being brought to the fore, adopting these does not solve any of the fundamental problems of trust in the cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yang, W., Fung, C.: A survey on security in network function virtualisation. In: IEEE NetSoft Conference and Workshops, pp. 15–19 (2016)

    Google Scholar 

  2. Operators, N.: Network functions virtualization, an introduction, benefits, enablers, challenges and call for action. In: SDN and OpenFlow SDN and OpenFlow World Congress (2012)

    Google Scholar 

  3. ETSI, G.: Network functions virtualisation (NFV): architectural framework. ETSI GS NFV 2(2), V1.ETSI (2013)

    Google Scholar 

  4. Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: a virtual machine directed approach to trusted computing. In: USENIX Virtual Machine Research and Technology Symposium (2004)

    Google Scholar 

  5. Han, B., Gopalakrishnan, V., Ji, L., Lee, S.: Network function virtualization: Challenges and opportunities for innovations. IEEE Commun. Mag. 53(2), 90–97 (2015)

    Article  Google Scholar 

  6. Krautheim, F.J., Phatak, D.S., Sherman, A.T.: Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) Trust 2010. LNCS, vol. 6101, pp. 211–227. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13869-0_14

    Chapter  Google Scholar 

  7. Rocha, F., Correia, M.: Lucy in the sky without diamonds: stealing confidential data in the cloud. In: 2011 IEEE/IFIP 41st International Conference Dependable Systems and Networks Workshops (DSN-W), pp. 129–134 (2011)

    Google Scholar 

  8. ETSI, G.: NFV Security and Trust Guidance, ETSI GS NFV-SEC 003 V1.1.1 (2014)

    Google Scholar 

  9. ETSI, G.: Network Function Virtualization: Trust; Report on Attestation Technologies and Practices for Secure Deployments, ETSI GS NFV SEC 007 V0.0.3 (2015)

    Google Scholar 

  10. Khan, K.M., Malluhi, Q.: Establishing trust in cloud computing. IT Prof. 12(5), 20–27 (2010)

    Article  Google Scholar 

  11. Stumpf, F., Benz, M., Hermanowski, M., Eckert, C.: An approach to a trustworthy system architecture using virtualization. In: Xiao, B., Yang, Laurence T., Ma, J., Muller-Schloer, C., Hua, Yu. (eds.) ATC 2007. LNCS, vol. 4610, pp. 191–202. Springer, Heidelberg (2007). doi:10.1007/978-3-540-73547-2_21

    Chapter  Google Scholar 

  12. Yan, Z., Zhang, P., Vasilakos, A.V.: A security and trust framework for virtualized networks and software-defined networking. Secur. Commun. Netw. 9, 3059–3069 (2015)

    Article  Google Scholar 

  13. Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Int. Serv. Appl. 1(1), 7–18 (2010)

    Article  Google Scholar 

  14. Sowmya, R., Lal, S., Oliver, I., Hippelainen, L.: Incorporating Trust in NFV: Addressing the Challenges, IEEE ICIN (2017, to appear)

    Google Scholar 

  15. Lal, S., Sowmya, R., Oliver, I., Taleb, T.: Assuring VNF image integrity and host sealing in Telco Cloud, IEEE ICC (2017, to appear)

    Google Scholar 

Download references

Acknowledgments

This work was made under the DIMECC Cyber Trust Program (Finland).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ian Oliver .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Oliver, I. et al. (2017). Experiences in Trusted Cloud Computing. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64701-2_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64700-5

  • Online ISBN: 978-3-319-64701-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics