Experiences in Trusted Cloud Computing

被引:4
作者
Oliver, Ian [1 ]
Holtmanns, Silke [1 ]
Miche, Yoan [1 ]
Lal, Shankar [1 ]
Hippelainen, Leo [1 ]
Kalliola, Aapo [1 ]
Ravidas, Sowmya [1 ]
机构
[1] Secur Res Grp, Nokia Bell Labs, Espoo, Finland
来源
NETWORK AND SYSTEM SECURITY | 2017年 / 10394卷
关键词
NFV; Trusted computing; Security; Telecommunications; Cloud;
D O I
10.1007/978-3-319-64701-2_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While trusted computing is a well-known technology, its role has been relatively limited in scope and typically limited to single machines. The advent of cloud computing, its role as critical infrastructure and the requirement for trust between the users of computing resources combines to form a perfect environment for trusted and high-integrity computing. Indeed, the use of trusted computing is an enabling technology over nearly all 'cyber' areas: secure supply chain management, privacy and critical data protection, data sovereignty, cyber defense, legal etc. To achieve this, we must fundamentally redefine what we mean by trusted and high-integrity computing. We are required to go beyond boot-time trust and rethink notions of run-time trust, partial trust, how systems are constructed, the trust between management and operations, compute and storage infrastructure and the dynamic provisioning of services by external parties. While attestation technologies, so-called run-time trust and virtualized TPM are being brought to the fore, adopting these does not solve any of the fundamental problems of trust in the cloud.
引用
收藏
页码:19 / 30
页数:12
相关论文
共 15 条
[1]  
[Anonymous], 2012, SDN OPENFLOW SDN OPE
[2]  
[Anonymous], 2014, 003 ETSI GS NFVSEC
[3]  
[Anonymous], 2013, ETSI GS NFV
[4]  
ETSI, 2015, 007 ETSI GS NFV SEC
[5]  
Haldar V, 2004, USENIX VIRTUAL MACHI
[6]   Network Function Virtualization: Challenges and Opportunities for Innovations [J].
Han, Bo ;
Gopalakrishnan, Vijay ;
Ji, Lusheng ;
Lee, Seungjoon .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (02) :90-97
[7]   Establishing Trust in Cloud Computing [J].
Khan, Khaled M. ;
Malluhi, Qutaibah .
IT PROFESSIONAL, 2010, 12 (05) :20-26
[8]  
Krautheim FJ, 2010, LECT NOTES COMPUT SC, V6101, P211, DOI 10.1007/978-3-642-13869-0_14
[9]  
Lal S, 2017, IEEE ICC
[10]  
Rocha F., 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), P129, DOI 10.1109/DSNW.2011.5958798