Architecture for high confidence cloud security monitoring
T Kanstrén, S Lehtonen, R Savola… - 2015 IEEE …, 2015 - ieeexplore.ieee.org
T Kanstrén, S Lehtonen, R Savola, H Kukkohovi, K Hätönen
2015 IEEE International Conference on Cloud Engineering, 2015•ieeexplore.ieee.orgOperational security assurance of a networked system requires providing constant and up-to-
date evidence of its operational state. In a cloud-based environment we deploy our services
as virtual guests running on external hosts. As this environment is not under our full control,
we have to find ways to provide assurance that the security information provided from this
environment is accurate, and our software is running in the expected environment. In this
paper, we present an architecture for providing increased confidence in measurements of …
date evidence of its operational state. In a cloud-based environment we deploy our services
as virtual guests running on external hosts. As this environment is not under our full control,
we have to find ways to provide assurance that the security information provided from this
environment is accurate, and our software is running in the expected environment. In this
paper, we present an architecture for providing increased confidence in measurements of …
Operational security assurance of a networked system requires providing constant and up-to-date evidence of its operational state. In a cloud-based environment we deploy our services as virtual guests running on external hosts. As this environment is not under our full control, we have to find ways to provide assurance that the security information provided from this environment is accurate, and our software is running in the expected environment. In this paper, we present an architecture for providing increased confidence in measurements of such cloud-based deployments. The architecture is based on a set of deployed measurement probes and trusted platform modules (TPM) across both the host infrastructure and guest virtual machines. The TPM are used to verify the integrity of the probes and measurements they provide. This allows us to ensure that the system is running in the expected environment, the monitoring probes have not been tampered with, and the integrity of measurement data provided is maintained. Overall this gives us a basis for increased confidence in the security of running parts of our system in an external cloud-based environment.
ieeexplore.ieee.org
Showing the best result for this search. See all results