D. Jha, Graham Lenton, James Asker, D. Blundell, D. Wallom
{"title":"TrustedCloud","authors":"D. Jha, Graham Lenton, James Asker, D. Blundell, D. Wallom","doi":"10.1145/3565386.3565492","DOIUrl":null,"url":null,"abstract":"Applications executing in the cloud are prone to numerous attacks including network, malware and data manipulation which are not immediately apparent. The Dwell Time for an attack to be noticed is currently 211 days where human error is reported to be a factor of 95% of data breaches [1]. In this abstract, we present TrustedCloud, a novel framework for run-time trust state analysis of a virtual machine (VM). TrustedCloud has four components, a) Trust Agent, b) Kernel Module and c) Trusted Platform Module (TPM) executing in all the VMs while d) Verification Cluster, a centralised entity verifying the VM's state. We will show the functioning of the TrustedCloud from the stage of VM creation to the detection of unauthorised service execution.","PeriodicalId":159238,"journal":{"name":"Proceedings of the 23rd International Middleware Conference: Demos and Posters","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"TrustedCloud\",\"authors\":\"D. Jha, Graham Lenton, James Asker, D. Blundell, D. Wallom\",\"doi\":\"10.1145/3565386.3565492\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Applications executing in the cloud are prone to numerous attacks including network, malware and data manipulation which are not immediately apparent. The Dwell Time for an attack to be noticed is currently 211 days where human error is reported to be a factor of 95% of data breaches [1]. In this abstract, we present TrustedCloud, a novel framework for run-time trust state analysis of a virtual machine (VM). TrustedCloud has four components, a) Trust Agent, b) Kernel Module and c) Trusted Platform Module (TPM) executing in all the VMs while d) Verification Cluster, a centralised entity verifying the VM's state. We will show the functioning of the TrustedCloud from the stage of VM creation to the detection of unauthorised service execution.\",\"PeriodicalId\":159238,\"journal\":{\"name\":\"Proceedings of the 23rd International Middleware Conference: Demos and Posters\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 23rd International Middleware Conference: Demos and Posters\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3565386.3565492\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 23rd International Middleware Conference: Demos and Posters","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3565386.3565492","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Applications executing in the cloud are prone to numerous attacks including network, malware and data manipulation which are not immediately apparent. The Dwell Time for an attack to be noticed is currently 211 days where human error is reported to be a factor of 95% of data breaches [1]. In this abstract, we present TrustedCloud, a novel framework for run-time trust state analysis of a virtual machine (VM). TrustedCloud has four components, a) Trust Agent, b) Kernel Module and c) Trusted Platform Module (TPM) executing in all the VMs while d) Verification Cluster, a centralised entity verifying the VM's state. We will show the functioning of the TrustedCloud from the stage of VM creation to the detection of unauthorised service execution.