Abir Awad, Sara Kadry, Brian A. Lee, Gururaj Maddodi, Eoin O'Meara
{"title":"通过组合PBA和来源实现云中的完整性保证","authors":"Abir Awad, Sara Kadry, Brian A. Lee, Gururaj Maddodi, Eoin O'Meara","doi":"10.1109/NGMAST.2016.15","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a new integrity assurance system in the cloud by using both hard and soft attestations. By hard attestation, we mean the usage of trusted computing to certify the machines in the cloud or to detect any tamper on the system level including boot, bios and operating system. The soft assurance mechanism is based on the analysis of the cloud provenance data which are collected by logging kernel system calls. This mechanism is data centric which means that it allows the detection of any changes to data artifacts in the cloud. The results of our integrity assurance system is communicated to the user using Cloud Trust Protocol (CTP) developed by the Cloud Security Alliance (CSA). Our proposed scheme is tested on an OpenStack cloud to show a proof of concept of our integrity assurance system.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Integrity Assurance in the Cloud by Combined PBA and Provenance\",\"authors\":\"Abir Awad, Sara Kadry, Brian A. Lee, Gururaj Maddodi, Eoin O'Meara\",\"doi\":\"10.1109/NGMAST.2016.15\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a new integrity assurance system in the cloud by using both hard and soft attestations. By hard attestation, we mean the usage of trusted computing to certify the machines in the cloud or to detect any tamper on the system level including boot, bios and operating system. The soft assurance mechanism is based on the analysis of the cloud provenance data which are collected by logging kernel system calls. This mechanism is data centric which means that it allows the detection of any changes to data artifacts in the cloud. The results of our integrity assurance system is communicated to the user using Cloud Trust Protocol (CTP) developed by the Cloud Security Alliance (CSA). Our proposed scheme is tested on an OpenStack cloud to show a proof of concept of our integrity assurance system.\",\"PeriodicalId\":340716,\"journal\":{\"name\":\"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)\",\"volume\":\"175 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NGMAST.2016.15\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NGMAST.2016.15","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Integrity Assurance in the Cloud by Combined PBA and Provenance
In this paper, we propose a new integrity assurance system in the cloud by using both hard and soft attestations. By hard attestation, we mean the usage of trusted computing to certify the machines in the cloud or to detect any tamper on the system level including boot, bios and operating system. The soft assurance mechanism is based on the analysis of the cloud provenance data which are collected by logging kernel system calls. This mechanism is data centric which means that it allows the detection of any changes to data artifacts in the cloud. The results of our integrity assurance system is communicated to the user using Cloud Trust Protocol (CTP) developed by the Cloud Security Alliance (CSA). Our proposed scheme is tested on an OpenStack cloud to show a proof of concept of our integrity assurance system.