User-policy-based dynamic remote attestation in cloud computing

被引:5
作者
Ba, Haihe [1 ]
Ren, Jiangchun [1 ]
Wang, Zhiying [1 ]
Zhou, Huaizhe [1 ]
Li, Yiming [1 ]
Hong, Tie [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud computing; root of trust; DTEM; JVM; user-defined policy; dynamic remote attestation;
D O I
10.1504/IJES.2016.073751
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As one of the most influential technologies, cloud computing brings users more benefits and improves the efficiency of computing in comparison to the traditional model. However, it also introduces a number of unknown risks and challenges, upon which effectiveness and efficiency of those traditional security protection solutions could have very little influence. We introduce DTEM into JVM, which gives robust trust guarantees to Java applications and makes a dynamic attestation about the integrity state of the current applications. DTEM advanced the state of the art in trusted computing and is designed to tackle the dynamic issues by verifying the runtime bytecode integrity of these applications in cloud environments. DTEM not only provides user-defined policy to determine the complexity of integrity checks and the frequency of their executions, but also enhances the availability to pledge the continuous business. What is more, it has less impact on execution performance of cloud applications.
引用
收藏
页码:39 / 45
页数:7
相关论文
共 14 条
[1]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[2]  
Fazio M, 2013, INT J COMPUT SCI ENG, V8, P227
[3]  
Gopalan A., 2012, LNICST, V94, P148, DOI [10.1007/978-3-642- 30244-2_13, DOI 10.1007/978-3-642-30244-2_13]
[4]  
Haldar V., 2004, USENIX VIRT MACH RES
[5]  
Jaeger T., 2006, SACMAT 2006. Proceedings of Eleventh ACM Symposium on Access Control Models and Technologies, P19
[6]   Establishing Trust in Cloud Computing [J].
Khan, Khaled M. ;
Malluhi, Qutaibah .
IT PROFESSIONAL, 2010, 12 (05) :20-26
[7]   Dynamic class loading in the Java']Java™ virtual machine [J].
Liang, S ;
Bracha, G .
ACM SIGPLAN NOTICES, 1998, 33 (10) :36-44
[8]  
Sailer R, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P223
[9]   Research on trusted computing and its development [J].
Shen ChangXiang ;
Zhang HuanGuo ;
Wang HuaiMin ;
Wang Ji ;
Zhao Bo ;
Yan Fei ;
Yu FaJiang ;
Zhang LiQiang ;
Xu MingDi .
SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (03) :405-433
[10]   An architecture for enterprise PC cloud [J].
Sodhi, Balwinder ;
Prabhakar, T. V. .
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2012, 7 (04) :296-307