2015 IEEE International Conference on Cloud Engineering 2015
DOI: 10.1109/ic2e.2015.32
|View full text |Cite
|
Sign up to set email alerts
|

Scalable Attestation: A Step Toward Secure and Trusted Clouds

Abstract: In this work we present Scalable Attestation, a method which combines both secure boot and trusted boot technologies, and extends them up into the host, its programs, and up into the guest's operating system and workloads, to both detect and prevent integrity attacks. Anchored in hardware, this integrity appraisal and attestation protects persistent data (files) from remote attack, even if the attack is root privileged. As an added benefit of a hardware rooted attestation, we gain a simple hardware based geolo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…The goal of trusted attestation is to prove to a remote party that the operating system and application software are intact and trustworthy [37] . Trusted attestation usually includes three roles: a challenger, a target system, and an authoritative third party, e.g., a Certificate Authority (CA).…”
Section: Trusted Attestationmentioning
confidence: 99%
“…The goal of trusted attestation is to prove to a remote party that the operating system and application software are intact and trustworthy [37] . Trusted attestation usually includes three roles: a challenger, a target system, and an authoritative third party, e.g., a Certificate Authority (CA).…”
Section: Trusted Attestationmentioning
confidence: 99%
“…TPM and remote attestation for cloud computing [43] are reaching maturity, with IBM rolling out an open source, scalable trusted platform based on virtual TPMs [44]. Indeed, Berger et al [44] describe a mechanism allowing the TPM and remote attestation to be provided for virtual machine offerings and container-based solutions, covering the whole range of contemporary cloud offerings. Furthermore, the approach not only allows the state of the software stack to be verified at boot time, but also during execution, and can thus prevent run-time modification of the system configuration.…”
Section: Leveraging Hardware Roots Of Trustmentioning
confidence: 99%
“…Abbadi [11] propose the combined chain-of-trust, which builds a single chain-of-trust to attest to a cluster of nodes who have exactly the same configuration. Stefan et al [12] extend the OpenAttestation to support a Trusted OpenStack infrastructure, and to attest the IMA [19] measurement list of a node.…”
Section: Tpm Extend(pcr Newmentioning
confidence: 99%
“…Measurement facilities are deployed inside each DomU to measure its chain-of-trust. Detailed constructions can be found in [12].…”
Section: Preliminary Implementation Designmentioning
confidence: 99%
See 1 more Smart Citation