Visible to the public Policy-Customized: A New Abstraction for Building Security as a Service

TitlePolicy-Customized: A New Abstraction for Building Security as a Service
Publication TypeConference Paper
Year of Publication2017
AuthorsHuang, C., Hou, C., He, L., Dai, H., Ding, Y.
Conference Name2017 14th International Symposium on Pervasive Systems, Algorithms and Networks 2017 11th International Conference on Frontier of Computer Science and Technology 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC)
Date Publishedjun
ISBN Number978-1-5386-0840-1
Keywordscloud computing, Computer architecture, human factors, Metrics, Pervasive Computing Security, Policy-Customized, Protocols, pubcrawl, remote attestation, Resiliency, Scalability, security, Security on Demand, security policies, Servers, Trusted Cloud Service, Virtual machine monitors, Virtual machining
Abstract

Just as cloud customers have different performance requirements, they also have different security requirements for their computations in the cloud. Researchers have suggested a "security on demand" service model for cloud computing, where secure computing environment are dynamically provisioned to cloud customers according to their specific security needs. The availability of secure computing platforms is a necessary but not a sufficient solution to convince cloud customers to move their sensitive data and code to the cloud. Cloud customers need further assurance to convince them that the security measures are indeed deployed, and are working correctly. In this paper, we present Policy-Customized Trusted Cloud Service architecture with a new remote attestation scheme and a virtual machine migration protocol, where cloud customer can custom security policy of computing environment and validate whether the current computing environment meets the security policy in the whole life cycle of the virtual machine. To prove the availability of proposed architecture, we realize a prototype that support customer-customized security policy and a VM migration protocol that support customer-customized migration policy and validation based on open source Xen Hypervisor.

URLhttps://ieeexplore.ieee.org/document/8121774/
DOI10.1109/ISPAN-FCST-ISCC.2017.57
Citation Keyhuang_policy-customized:_2017