Opportunities in using a secure element to increase confidence in cloud security monitoring

Teemu Kanstrén, Sami Lehtonen, Hilkka Kukkohovi

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    2 Citations (Scopus)

    Abstract

    In this paper we discuss applications of a secure element (SE) such as trusted platform module (TPM) for increasing confidence in cloud security monitoring from the cloud customer viewpoint. Monitoring security of cloud-based systems is similar in many ways to traditional in-house networks, but with the difference that the actual hardware is hosted by an external party and not under our control. This provides some unique challenges and opportunities for security monitoring. We discuss these challenges, identify related opportunities for SE use, and use these to present solutions to the identified challenges. This is based on three different use cases identified together with our industry partners. These are the monitoring of elements of the host infrastructure, monitoring our virtualized guest instances running on this infrastructure, and collecting and archiving log data for later external auditing of the cloud customer services. For each of these, we describe the problem area and different ways we have applied a TPM to increase trust and visibility.
    Original languageEnglish
    Title of host publicationCloud Computing (CLOUD), 2015 IEEE 8th International Conference on
    PublisherIEEE Institute of Electrical and Electronic Engineers
    Pages1093 - 1098
    ISBN (Electronic)978-1-4673-7286-2, 978-1-4673-7287-9
    DOIs
    Publication statusPublished - 20 Aug 2015
    MoE publication typeA4 Article in a conference publication
    EventIEEE 8th International Conference on Cloud Computing - New York, United States
    Duration: 27 Jun 20152 Jul 2015
    Conference number: 8

    Conference

    ConferenceIEEE 8th International Conference on Cloud Computing
    Abbreviated titleCLOUD
    Country/TerritoryUnited States
    CityNew York
    Period27/06/152/07/15

    Keywords

    • cloud computing
    • cryptography
    • monitoring
    • probes
    • virtual machining

    Fingerprint

    Dive into the research topics of 'Opportunities in using a secure element to increase confidence in cloud security monitoring'. Together they form a unique fingerprint.

    Cite this