ICMWT 2017: Mobile and Wireless Technologies 2017 pp 424-429 | Cite as
Dynamic Information Extraction and Integrity Verification Scheme for Cloud Security
Abstract
To become a more popular cloud service, it is necessary to dynamically provision virtualized infrastructure resources and to automatically deploy and optimize workloads based on the state of the workload or the state of the entire infrastructure resource. However, in a cloud-based virtualization infrastructure, when multiple VMs work together to provide a customized virtualized network security service, existing debugging and profiling tools can no longer be used as performance measures or integrity verification tools. In order to solve these drawbacks, a tracing method is used. In the tracing, necessary information is simultaneously recorded with minimal overhead while executing the program. In this paper, we proposed a scheme to guarantee the integrity of the software that composes the VM in the cloud environment using Intel processor trace (PT).
Keywords
Processor trace Cloud security Information integrityNotes
Acknowledgement
This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (No. 2016-0-00078, Cloud-based Security Intelligence Technology Development for the Customized Security Service Provisioning).
References
- 1.Paxton NC (2016) Cloud security: a review of current issues and proposed solutions. In: International conference on collaboration and internet computing (CIC), pp 452–455Google Scholar
- 2.Mahboob T, Zahid M, Ahmad G (2016) Adopting information security techniques for cloud computing—a survey. In: International conference on information technology, information systems and electrical engineering (ICITISEE), pp 7–11Google Scholar
- 3.Thalheim J, Bhatotia P, Fetzer C (2016) INSPECTOR: data provenance using intel processor trace (PT). In: International conference on distributed computing systems (ICDCS), pp 25–34Google Scholar
- 4.Makkaoui KE, Ezzati A, Beni-Hssane A, Motamed C (2016) Cloud security and privacy model for providing secure cloud services. In: 2016 2nd international conference on cloud computing technologies and applications (CloudTech), pp 81–86Google Scholar
- 5.Duncan B, Bratterud A, Happe A (2016) Enhancing cloud security and privacy: time for a new approach? In: International conference on innovative computing technology (INTECH), pp 110–115Google Scholar
- 6.Lai S-F, Su H-K, Hsiao W-H, Chen K-J (2016) Design and implementation of cloud security defense system with software defined networking technologies. In: International conference on information and communication technology convergence (ICTC), pp 292–207Google Scholar
- 7.Kleen A, Simple Intel CPU processor tracing on Linux. https://github.com/andikleen/simple-pt