Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Trust but Verify : Trust Establishment Mechanisms in Infrastructure Clouds

Paladi, Nicolae LU orcid (2017)
Abstract
In the cloud computing service model, users consume computation resources provided through the Internet, often without any awareness of the cloud service provider that owns and operates the supporting hardware infrastructure. This marks an important change compared to earlier models of computation, for example when such supporting hardware infrastructure was under the control of the user. Given the ever increasing importance of computing, the shift to cloud computing raises several challenging issues, which include protecting the computation and ancillary resources such as network communication and the stored or produced data.
While the potential risks for data isolation and confidentiality in cloud infrastructure are somewhat known,... (More)
In the cloud computing service model, users consume computation resources provided through the Internet, often without any awareness of the cloud service provider that owns and operates the supporting hardware infrastructure. This marks an important change compared to earlier models of computation, for example when such supporting hardware infrastructure was under the control of the user. Given the ever increasing importance of computing, the shift to cloud computing raises several challenging issues, which include protecting the computation and ancillary resources such as network communication and the stored or produced data.
While the potential risks for data isolation and confidentiality in cloud infrastructure are somewhat known, they are obscured by the convenience of the service model and claimed trustworthiness of cloud service providers, backed by reputation and contractual agreements. Ongoing research on cloud infrastructure has the potential to strengthen the security guarantees of computation, data and communication for users of cloud computing. This thesis is part of such research efforts, focusing on assessing the trustworthiness of components of the cloud network infrastructure and cloud computing infrastructure and controlling access to data and network resources and addresses select aspects of cloud computing security.
The contributions of the thesis include mechanisms to verify or enforce security in cloud infrastructure. Such mechanisms have the potential to both help cloud service providers strengthen the security of their deployments and empower users to obtain guarantees regarding security aspects of service level agreements. By leveraging functionality of components such as the Trusted Platform Module, the thesis presents mechanisms to provide user guarantees regarding integrity of the computing environment and geographic location of plaintext data, as well as to allow users maintain control over the cryptographic keys for integrity and confidentiality protection of data stored in remote infrastructure. Furthermore, the thesis leverages recent innovations for platform security such as Software Guard Extensions to introduce mechanisms to verify the integrity of the network infrastructure in the Software-Defined Networking model. A final contribution of the thesis is an access control mechanism for access control of resources in the Software-Defined Networking model. (Less)
Please use this url to cite or link to this publication:
author
supervisor
opponent
  • Dr Saroiu, Stefan, Microsoft Research, USA
organization
publishing date
type
Thesis
publication status
published
subject
keywords
cloud computing infrastructure, security, trust
edition
1
pages
224 pages
publisher
The Department of Electrical and Information Technology
defense location
Lecture hall E:1406, E-huset, Ole Römers väg 3, Lund University, Faculty of Engineering.
defense date
2017-09-29 13:00:00
ISBN
978-91-7753-329-0
978-91-7753-330-6
language
English
LU publication?
yes
id
22c1d979-2d87-4099-b19c-ea140cd76663
date added to LUP
2017-08-31 15:21:42
date last changed
2022-04-11 12:48:25
@phdthesis{22c1d979-2d87-4099-b19c-ea140cd76663,
  abstract     = {{In the cloud computing service model, users consume computation resources provided through the Internet, often without any awareness of the cloud service provider that owns and operates the supporting hardware infrastructure. This marks an important change compared to earlier models of computation, for example when such supporting hardware infrastructure was under the control of the user. Given the ever increasing importance of computing, the shift to cloud computing raises several challenging issues, which include protecting the computation and ancillary resources such as network communication and the stored or produced data.<br/>While the potential risks for data isolation and confidentiality in cloud infrastructure are somewhat known, they are obscured by the convenience of the service model and claimed trustworthiness of cloud service providers, backed by reputation and contractual agreements. Ongoing research on cloud infrastructure has the potential to strengthen the security guarantees of computation, data and communication for users of cloud computing. This thesis is part of such research efforts, focusing on assessing the trustworthiness of components of the cloud network infrastructure and cloud computing infrastructure and controlling access to data and network resources and addresses select aspects of cloud computing security.<br/>The contributions of the thesis include mechanisms to verify or enforce security in cloud infrastructure. Such mechanisms have the potential to both help cloud service providers strengthen the security of their deployments and empower users to obtain guarantees regarding security aspects of service level agreements. By leveraging functionality of components such as the Trusted Platform Module, the thesis presents mechanisms to provide user guarantees regarding integrity of the computing environment and geographic location of plaintext data, as well as to allow users maintain control over the cryptographic keys for integrity and confidentiality protection of data stored in remote infrastructure. Furthermore, the thesis leverages recent innovations for platform security such as Software Guard Extensions to introduce mechanisms to verify the integrity of the network infrastructure in the Software-Defined Networking model. A final contribution of the thesis is an access control mechanism for access control of resources in the Software-Defined Networking model.}},
  author       = {{Paladi, Nicolae}},
  isbn         = {{978-91-7753-329-0}},
  keywords     = {{cloud computing infrastructure, security, trust}},
  language     = {{eng}},
  month        = {{09}},
  publisher    = {{The Department of Electrical and Information Technology}},
  school       = {{Lund University}},
  title        = {{Trust but Verify : Trust Establishment Mechanisms in Infrastructure Clouds}},
  url          = {{https://lup.lub.lu.se/search/files/30369903/nicolae_lth_thesis_FINAL.pdf}},
  year         = {{2017}},
}