Private Virtual Infrastructure: A Model for Trustworthy Utility Cloud Computing

dc.contributor.authorKrautheim, F. John
dc.contributor.authorPhatak, Dhananjay S.
dc.contributor.authorSherman, Alan T.
dc.date.accessioned2019-03-05T20:35:18Z
dc.date.available2019-03-05T20:35:18Z
dc.description.abstractPrivate Virtual Infrastructure is a security architecture for cloud computing which uses a new trust model to share the responsibility of security in cloud computing between the service provider and client, decreasing the risk exposure to both. Private Virtual Infrastructure is under control of the information owner while the cloud fabric is under control of the service provider. The Private Virtual Infrastructure architecture comprises a cluster of trusted computing fabric platforms that host virtual servers running an application server with a Locator Bot security service. The cloud Locator Bot pre-measures the cloud platform for security properties to determine the trustworthiness of the platform. The Locator Bot uses Trusted Execution Technology and virtual Trusted Platform Modules to pre-measure the target environment and securely provision the Private Virtual Infrastructure in the cloud thus protecting information by preventing data from being placed in malicious or untrusted environments. Private Virtual Infrastructure — including Locator Bot — provides organizations tools to maintain control of their information in the cloud and realize benefits of cloud computing, with assurance that their information is protected. This paper presents a cloud trust model, Private Virtual Infrastructure architecture, and a Locator Bot protocol in enough detail to support further analysis or implementation.en_US
dc.description.sponsorshipKrautheim and Sherman were supported in part by the Department of Defense under Information Assurance Scholarship Program grants H98230-08-1-0334 and H98230-09-1-0404.en_US
dc.description.urihttps://cisa.umbc.edu/files/2017/09/krautheim_tr-cs-10-04.pdfen_US
dc.format.extent36 pagesen_US
dc.genretechnical reportsen_US
dc.identifierdoi:10.13016/m21s88-kihy
dc.identifier.urihttp://hdl.handle.net/11603/12946
dc.language.isoen_USen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Center for Research and Exploration in Space Sciences & Technology II (CRSST II)
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department
dc.relation.ispartofseriesTechnical Report;TR-CS-10-04
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.subjectcloud computingen_US
dc.subjectsecurityen_US
dc.subjectarchitectureen_US
dc.subjectvirtualizationen_US
dc.subjecttrusted Computingen_US
dc.subjecttrusted platform moduleen_US
dc.subjectnetworkingen_US
dc.titlePrivate Virtual Infrastructure: A Model for Trustworthy Utility Cloud Computingen_US
dc.typeTexten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
krautheim_tr-cs-10-04.pdf
Size:
453.66 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: