Policy-Customized: A New Abstraction for Building Security as a Service
Title | Policy-Customized: A New Abstraction for Building Security as a Service |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Huang, C., Hou, C., He, L., Dai, H., Ding, Y. |
Conference Name | 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks 2017 11th International Conference on Frontier of Computer Science and Technology 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC) |
Date Published | jun |
ISBN Number | 978-1-5386-0840-1 |
Keywords | cloud computing, Computer architecture, human factors, Metrics, Pervasive Computing Security, Policy-Customized, Protocols, pubcrawl, remote attestation, Resiliency, Scalability, security, Security on Demand, security policies, Servers, Trusted Cloud Service, Virtual machine monitors, Virtual machining |
Abstract | Just as cloud customers have different performance requirements, they also have different security requirements for their computations in the cloud. Researchers have suggested a "security on demand" service model for cloud computing, where secure computing environment are dynamically provisioned to cloud customers according to their specific security needs. The availability of secure computing platforms is a necessary but not a sufficient solution to convince cloud customers to move their sensitive data and code to the cloud. Cloud customers need further assurance to convince them that the security measures are indeed deployed, and are working correctly. In this paper, we present Policy-Customized Trusted Cloud Service architecture with a new remote attestation scheme and a virtual machine migration protocol, where cloud customer can custom security policy of computing environment and validate whether the current computing environment meets the security policy in the whole life cycle of the virtual machine. To prove the availability of proposed architecture, we realize a prototype that support customer-customized security policy and a VM migration protocol that support customer-customized migration policy and validation based on open source Xen Hypervisor. |
URL | https://ieeexplore.ieee.org/document/8121774/ |
DOI | 10.1109/ISPAN-FCST-ISCC.2017.57 |
Citation Key | huang_policy-customized:_2017 |