用户监管可信云的概念化策略设计

Jörg Kebbedies, Josef Spillner, I. Braun, A. Schill
{"title":"用户监管可信云的概念化策略设计","authors":"Jörg Kebbedies, Josef Spillner, I. Braun, A. Schill","doi":"10.1109/UCC.2015.105","DOIUrl":null,"url":null,"abstract":"The term \"trust\" in the area of cloud computing has always been one of the most problematic issues. The cloud user becomes willing to accept insecure conditions and unconsciously increases these conditions' security level if he is able to find a strategy that provides trust. This level of trust, once established, is difficult to maintain if any deception takes place. The indications of proven trust can only be seen in future usage of a cloud service. For this reason, specific control instruments are required to ascertain the accuracy of one's trust. The establishment of trust in a public cloud environment requires a paradigm change: a holistic strategy that enforces regulation requirements throughout the cloud architecture. The movement of the root of trust into hardware reduces vulnerability to compromise, as hardware attacks require a high expenditure of time and effort. Cloud users would define regulation standards through trust-worthy IT instruments and enforce them in specific cloud-service layers. The extension of this approach is the regulation of SaaS-based applications to enforce requirements for separation and availability. This work introduces a conceptual approach to establish a chain of policy by using hardware-oriented root of trust. The conceptual description of a chain of policy outlines the main principles to enforce regulations accurately for each architectural cloud layer based on an established chain of trust.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Conceptualized Policy Design for User-Regulated Trusted Clouds\",\"authors\":\"Jörg Kebbedies, Josef Spillner, I. Braun, A. Schill\",\"doi\":\"10.1109/UCC.2015.105\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The term \\\"trust\\\" in the area of cloud computing has always been one of the most problematic issues. The cloud user becomes willing to accept insecure conditions and unconsciously increases these conditions' security level if he is able to find a strategy that provides trust. This level of trust, once established, is difficult to maintain if any deception takes place. The indications of proven trust can only be seen in future usage of a cloud service. For this reason, specific control instruments are required to ascertain the accuracy of one's trust. The establishment of trust in a public cloud environment requires a paradigm change: a holistic strategy that enforces regulation requirements throughout the cloud architecture. The movement of the root of trust into hardware reduces vulnerability to compromise, as hardware attacks require a high expenditure of time and effort. Cloud users would define regulation standards through trust-worthy IT instruments and enforce them in specific cloud-service layers. The extension of this approach is the regulation of SaaS-based applications to enforce requirements for separation and availability. This work introduces a conceptual approach to establish a chain of policy by using hardware-oriented root of trust. The conceptual description of a chain of policy outlines the main principles to enforce regulations accurately for each architectural cloud layer based on an established chain of trust.\",\"PeriodicalId\":381279,\"journal\":{\"name\":\"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UCC.2015.105\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UCC.2015.105","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

在云计算领域,术语“信任”一直是最有问题的问题之一。云用户变得愿意接受不安全的条件,如果他能够找到提供信任的策略,就会无意识地提高这些条件的安全级别。这种程度的信任,一旦建立,就很难维持,如果有任何欺骗发生。只有在将来使用云服务时才能看到已证明信任的迹象。因此,需要特定的控制手段来确定一个人的信任的准确性。在公共云环境中建立信任需要改变范式:在整个云架构中实施监管要求的整体战略。由于硬件攻击需要花费大量的时间和精力,因此将信任根转移到硬件中可以减少遭受攻击的风险。云用户将通过值得信赖的IT工具定义监管标准,并在特定的云服务层执行这些标准。这种方法的扩展是对基于saas的应用程序的规范,以加强对分离和可用性的需求。本文介绍了一种概念性方法,通过使用面向硬件的信任根来建立策略链。策略链的概念性描述概述了基于已建立的信任链对每个架构云层准确执行规则的主要原则。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Conceptualized Policy Design for User-Regulated Trusted Clouds
The term "trust" in the area of cloud computing has always been one of the most problematic issues. The cloud user becomes willing to accept insecure conditions and unconsciously increases these conditions' security level if he is able to find a strategy that provides trust. This level of trust, once established, is difficult to maintain if any deception takes place. The indications of proven trust can only be seen in future usage of a cloud service. For this reason, specific control instruments are required to ascertain the accuracy of one's trust. The establishment of trust in a public cloud environment requires a paradigm change: a holistic strategy that enforces regulation requirements throughout the cloud architecture. The movement of the root of trust into hardware reduces vulnerability to compromise, as hardware attacks require a high expenditure of time and effort. Cloud users would define regulation standards through trust-worthy IT instruments and enforce them in specific cloud-service layers. The extension of this approach is the regulation of SaaS-based applications to enforce requirements for separation and availability. This work introduces a conceptual approach to establish a chain of policy by using hardware-oriented root of trust. The conceptual description of a chain of policy outlines the main principles to enforce regulations accurately for each architectural cloud layer based on an established chain of trust.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
CYCLONE Unified Deployment and Management of Federated, Multi-cloud Applications Cloud Orchestration Features: Are Tools Fit for Purpose? Efficient Update of Encrypted Files for Cloud Storage Adaptive Performance Isolation Middleware for Multi-tenant SaaS Agent-Based Modelling as a Service on Amazon EC2: Opportunities and Challenges
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1