Towards trusted environment in cloud monitoring

Tuomas Kekkonen, Teemu Kanstrén, Kimmo Hätönen

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    4 Citations (Scopus)


    This paper investigates the problem of providing trusted monitoring information on a cloud environment to the cloud customers. The general trust between customer and provider is taken as a starting point. The paper discusses possible methods to strengthen this trust. It focuses on establishing a chain of trust inside the provider infrastructure to supply monitoring data for the customer. The goal is to enable delivery of state and event information to parties outside the cloud infrastructure. The current technologies and research are reviewed for the solution and the usage scenario is presented. Based on such technology, higher assurance of the cloud can be presented to the customer. This allows customers with high security requirements and responsibilities to have more confidence in accepting the cloud as their platform of choice.
    Original languageEnglish
    Title of host publication11th International Conference on Information Technology
    Subtitle of host publicationNew Generations
    PublisherIEEE Institute of Electrical and Electronic Engineers
    ISBN (Electronic)978-1-4799-3188-0, 978-1-4799-3186-6
    ISBN (Print)978-1-4799-3187-3
    Publication statusPublished - 2014
    MoE publication typeA4 Article in a conference publication
    Event11th International Conference on Information Technology: New Generations, ITNG 2014 - Las Vegas, NV, United States
    Duration: 7 Apr 20149 Apr 2014


    Conference11th International Conference on Information Technology: New Generations, ITNG 2014
    Abbreviated titleITNG 2014
    Country/TerritoryUnited States
    CityLas Vegas, NV


    • cloud platforms
    • security
    • cloud computing
    • integrity measurement
    • remote attestation


    Dive into the research topics of 'Towards trusted environment in cloud monitoring'. Together they form a unique fingerprint.

    Cite this