Dynamic Information Extraction and Integrity Verification Scheme for Cloud Security

  • Hyunjoo Kim
  • Youngsoo Kim
  • Ikkyun Kim
  • Hyuncheol Kim
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 425)

Abstract

To become a more popular cloud service, it is necessary to dynamically provision virtualized infrastructure resources and to automatically deploy and optimize workloads based on the state of the workload or the state of the entire infrastructure resource. However, in a cloud-based virtualization infrastructure, when multiple VMs work together to provide a customized virtualized network security service, existing debugging and profiling tools can no longer be used as performance measures or integrity verification tools. In order to solve these drawbacks, a tracing method is used. In the tracing, necessary information is simultaneously recorded with minimal overhead while executing the program. In this paper, we proposed a scheme to guarantee the integrity of the software that composes the VM in the cloud environment using Intel processor trace (PT).

Keywords

Processor trace Cloud security Information integrity 

Notes

Acknowledgement

This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (No. 2016-0-00078, Cloud-based Security Intelligence Technology Development for the Customized Security Service Provisioning).

References

  1. 1.
    Paxton NC (2016) Cloud security: a review of current issues and proposed solutions. In: International conference on collaboration and internet computing (CIC), pp 452–455Google Scholar
  2. 2.
    Mahboob T, Zahid M, Ahmad G (2016) Adopting information security techniques for cloud computing—a survey. In: International conference on information technology, information systems and electrical engineering (ICITISEE), pp 7–11Google Scholar
  3. 3.
    Thalheim J, Bhatotia P, Fetzer C (2016) INSPECTOR: data provenance using intel processor trace (PT). In: International conference on distributed computing systems (ICDCS), pp 25–34Google Scholar
  4. 4.
    Makkaoui KE, Ezzati A, Beni-Hssane A, Motamed C (2016) Cloud security and privacy model for providing secure cloud services. In: 2016 2nd international conference on cloud computing technologies and applications (CloudTech), pp 81–86Google Scholar
  5. 5.
    Duncan B, Bratterud A, Happe A (2016) Enhancing cloud security and privacy: time for a new approach? In: International conference on innovative computing technology (INTECH), pp 110–115Google Scholar
  6. 6.
    Lai S-F, Su H-K, Hsiao W-H, Chen K-J (2016) Design and implementation of cloud security defense system with software defined networking technologies. In: International conference on information and communication technology convergence (ICTC), pp 292–207Google Scholar
  7. 7.
    Kleen A, Simple Intel CPU processor tracing on Linux. https://github.com/andikleen/simple-pt

Copyright information

© Springer Science+Business Media Singapore 2018

Authors and Affiliations

  • Hyunjoo Kim
    • 1
  • Youngsoo Kim
    • 1
  • Ikkyun Kim
    • 1
  • Hyuncheol Kim
    • 2
  1. 1.Information Security Research DivisionElectronics and Telecommunications Research InstituteDaejeonKorea
  2. 2.Department of Computer ScienceNamseoul UniversityCheonanKorea

Personalised recommendations