The protocol design of a eucalyptus-based infrastructure-as-a-service (IaaS) cloud framework

被引:0
作者
Cui, Wei [1 ]
Li, Yi-Fa [1 ]
Si, Xue-Ming [1 ]
机构
[1] School of Information Engineering, Information Engineering University
来源
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology | 2012年 / 34卷 / 07期
基金
欧盟地平线“2020”;
关键词
Cloud computing; Eucalyptus; Infrastructure-as-a-Service (IaaS); Trusted computing;
D O I
10.3724/SP.J.1146.2011.01150
中图分类号
学科分类号
摘要
Infrastructure-as-a-Service (IaaS) frees users from the trouble of self-management of computer hardware, and provides users with anytime, anywhere on demand computing and storage resources. Eucalyptus is an open source IaaS framework implementation which is used for research. However, there is no paper describes how to use all the modules of Eucalyptus to supply security infrastructure service. In accordance with the security requirements of IaaS, a trusted IaaS framework is provided. The framework provides infrastructure service in five steps, and designs protocols which based on Trusted Platform Module (TPM) to achieve these steps. During the designing process, the use of TPM is strictly standardized and trusted third party is concerned in order to restrict the power of service operator. All the protocols pass the security examination of automatic analysis tool-Scyther, so the conclusion that the framework meets the requirements of IaaS is generalized.
引用
收藏
页码:1748 / 1754
页数:6
相关论文
共 12 条
[1]  
Luis V., Luis R., Daniel M., Locking the sky: A survey on IaaS cloud security, Computing, 91, 1, pp. 93-118, (2011)
[2]  
Daniel D., Rich W., Chris G., Et al., The eucalyptus opensource cloud-computing system, Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, pp. 124-131, (2009)
[3]  
Nuno S., Krishna G., Rodrigo R., Towards trusted cloud computing, Proceeding of the 2009 Conference on Hot Topics in Cloud Computing, pp. 22-27, (2009)
[4]  
Khan I., Rehman H., Anwar Z., Design and deployment of a trusted eucalyptus cloud, 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 380-387, (2011)
[5]  
11889-1-2009 Information technology-trusted platform module - Part 2: Design principles, (2009)
[6]  
Berthonlon B., Varrette S., Bouvry P., Certicloud: A novel TPM-based approach to ensure cloud IaaS security, 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 121-130, (2011)
[7]  
Dhinesh B., Venkata K., Mohammed Z., Et al., An analysis of security related issues in cloud computing, Communications in Computer and Information Science, 168, 2, pp. 180-190, (2011)
[8]  
Anupam D., Ante D., John M., Et al., Protocol Composition Logic (PCL), Electronic Notes in Theoretical Computer Science, 172, pp. 311-358, (2007)
[9]  
Canetti R., Universally composable security: A new paradigm for cryptographic protocols, Proceeding of Foundations of Computer Science, pp. 136-145, (2001)
[10]  
Chaki S., Datta A., ASPIER: An automated framework for verifying security protocol implementations, Computer Security Foundations Symposium, pp. 172-185, (2009)