Trusted platform-as-a-service: a foundation for trustworthy cloud-hosted applications

Andrew Brown, J. Chase
{"title":"Trusted platform-as-a-service: a foundation for trustworthy cloud-hosted applications","authors":"Andrew Brown, J. Chase","doi":"10.1145/2046660.2046665","DOIUrl":null,"url":null,"abstract":"The applications we use are increasingly packaged as network services running in the cloud under the control of a service provider. Users of these services have no basis to determine if these services are trustworthy, beyond the assurances of the service provider. Our work addresses the problem of how to build support for trustworthy services in the cloud, within the context of a larger trust management framework.\n This paper shows how users can gain insights and trust into service applications by leveraging trust in a neutral third party: a cloud provider that hosts application services on an infrastructure and platform that it controls. A trusted cloud provider may act as a root of trust to attest cloud-hosted services to their clients---a trusted platform cloud. We have prototyped this approach in a trusted platform-as-a-service cloud provider supporting a Python/Django web framework. The cloud provider seals instances of service applications and attests their Python source code to external users. Once launched and attested, service instances run with an independent identity and are isolated from tampering by the cloud customer, except through well-defined operator interfaces that are part of the service definition.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"37","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cloud Computing Security Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2046660.2046665","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 37

Abstract

The applications we use are increasingly packaged as network services running in the cloud under the control of a service provider. Users of these services have no basis to determine if these services are trustworthy, beyond the assurances of the service provider. Our work addresses the problem of how to build support for trustworthy services in the cloud, within the context of a larger trust management framework. This paper shows how users can gain insights and trust into service applications by leveraging trust in a neutral third party: a cloud provider that hosts application services on an infrastructure and platform that it controls. A trusted cloud provider may act as a root of trust to attest cloud-hosted services to their clients---a trusted platform cloud. We have prototyped this approach in a trusted platform-as-a-service cloud provider supporting a Python/Django web framework. The cloud provider seals instances of service applications and attests their Python source code to external users. Once launched and attested, service instances run with an independent identity and are isolated from tampering by the cloud customer, except through well-defined operator interfaces that are part of the service definition.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
可信的平台即服务:可信的云托管应用程序的基础
我们使用的应用程序越来越多地被打包成网络服务,在服务提供商的控制下运行在云中。除了服务提供商的保证之外,这些服务的用户没有依据来确定这些服务是否值得信赖。我们的工作解决了如何在更大的信任管理框架的背景下构建对云中可信服务的支持的问题。本文展示了用户如何通过利用对中立第三方(在其控制的基础设施和平台上托管应用程序服务的云提供商)的信任来获得对服务应用程序的洞察力和信任。受信任的云提供商可以充当信任根,向其客户证明云托管服务——一个受信任的平台云。我们已经在一个受信任的平台即服务云提供商中构建了这种方法的原型,该云提供商支持Python/Django web框架。云提供商对服务应用程序的实例进行密封,并向外部用户验证它们的Python源代码。一旦启动并经过验证,服务实例就会以独立的身份运行,并且不受云客户的篡改,除非通过作为服务定义一部分的定义良好的操作符接口。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Side Channels in Multi-Tenant Environments How Private is Your Private Cloud?: Security Analysis of Cloud Control Interfaces Return of the Covert Channel, Data Center Style Fast Order-Preserving Encryption from Uniform Distribution Sampling Cloud Security: The Industry Landscape and the Lure of Zero-Knowledge Protection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1