Abstract
In this paper we discuss applications of a secure element (SE) such as trusted platform module (TPM) for increasing confidence in cloud security monitoring from the cloud customer viewpoint. Monitoring security of cloud-based systems is similar in many ways to traditional in-house networks, but with the difference that the actual hardware is hosted by an external party and not under our control. This provides some unique challenges and opportunities for security monitoring. We discuss these challenges, identify related opportunities for SE use, and use these to present solutions to the identified challenges. This is based on three different use cases identified together with our industry partners. These are the monitoring of elements of the host infrastructure, monitoring our virtualized guest instances running on this infrastructure, and collecting and archiving log data for later external auditing of the cloud customer services. For each of these, we describe the problem area and different ways we have applied a TPM to increase trust and visibility.
Original language | English |
---|---|
Title of host publication | Cloud Computing (CLOUD), 2015 IEEE 8th International Conference on |
Publisher | IEEE Institute of Electrical and Electronic Engineers |
Pages | 1093 - 1098 |
ISBN (Electronic) | 978-1-4673-7286-2, 978-1-4673-7287-9 |
DOIs | |
Publication status | Published - 20 Aug 2015 |
MoE publication type | A4 Article in a conference publication |
Event | IEEE 8th International Conference on Cloud Computing - New York, United States Duration: 27 Jun 2015 → 2 Jul 2015 Conference number: 8 |
Conference
Conference | IEEE 8th International Conference on Cloud Computing |
---|---|
Abbreviated title | CLOUD |
Country/Territory | United States |
City | New York |
Period | 27/06/15 → 2/07/15 |
Keywords
- cloud computing
- cryptography
- monitoring
- probes
- virtual machining