Trustworthy Geographically Fenced Hybrid Clouds

被引:10
作者
Jayaram, K. R. [1 ]
Safford, David [1 ]
Sharma, Upendra [1 ]
Naik, Vijay [1 ]
Pendarakis, Dimitrios [1 ]
Tao, Shu [1 ]
机构
[1] IBM Res Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
来源
ACM/IFIP/USENIX MIDDLEWARE 2014 | 2014年
关键词
geographic fencing; integrity management; attestation;
D O I
10.1145/2663165.2666091
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Adoption of hybrid clouds by enterprises has been hampered by the inability of current hybrid cloud infrastructures to provide scalable and efficient mechanisms (1) to ensure the trustworthiness and integrity of the software stack executing a hybrid application workload, or (2) to enforce governmental privacy, data jurisdiction and audit regulations by ensuring that remote data and computation do not cross specified geographic boundaries. This paper presents our vision of trustworthy geographically fenced hybrid clouds (TGHC), a generic, scalable and extensible middleware system to automatically bridge the gap between applications with their integrity and geo-fencing policies, and raw hardware infrastructure. It describes TGHCs modularly, by (a) outlining the challenges in certifying the trustworthiness of cloud computing infrastructures and in geo-fencing computation, including scalability limitations of existing solutions, (b) presenting scalable mechanisms to transform bare metal servers into trusted IaaS computing pools through integrity measurement, management and monitoring that leverage open, off-the-shelf hardware technologies like Intel TPM, (c) introducing workload specification languages to specify integrity and geo-fencing policies on hybrid workloads, and (d) extending IaaS systems to ensure that workload bursting from private data centers to public clouds uses trusted computing pools and respects geographic boundaries during initial placement of virtual machines (VMs) and further migration. We also present early results from our implementation illustrating the feasibility of our proposed architecture, and outline future research challenges in engineering and effectively using TGHCs.
引用
收藏
页码:37 / 48
页数:12
相关论文
共 31 条
[1]  
[Anonymous], 2009, P 1 USENIX WORKSH H
[2]  
[Anonymous], SECURITY
[3]  
[Anonymous], SEC PRIV CONTR FED I
[4]  
[Anonymous], 2013, P 8 ACM EUROPEAN C C, DOI [10.1007/978-94-007-6925-0_19, DOI 10.1007/978-94-007-6925-0_19, DOI 10.1145/2465351.2465386]
[5]  
[Anonymous], 2006, P 15 C USENIX SEC S
[6]  
ARM, 2014, ARM TRUSTZONE TECHN
[7]   Proof verification and the hardness of approximation problems [J].
Arora, S ;
Lund, C ;
Motwani, R ;
Sudan, M ;
Szegedy, M .
JOURNAL OF THE ACM, 1998, 45 (03) :501-555
[8]  
Bacon J, 2010, LECT NOTES COMPUT SC, V6452, P293, DOI 10.1007/978-3-642-16955-7_15
[9]   Verifying computations with state [J].
Braun, Benjamin ;
Feldman, Ariel J. ;
Ren, Zuocheng ;
Setty, Srinath ;
Blumberg, Andrew J. ;
Walfish, Michael .
SOSP'13: PROCEEDINGS OF THE TWENTY-FOURTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, 2013, :341-357
[10]  
Damgard Ivan, 2008, International Journal of Applied Cryptography, V1, P22, DOI 10.1504/IJACT.2008.017048