Private Virtual Infrastructure: A Model for Trustworthy Utility Cloud Computing
dc.contributor.author | Krautheim, F. John | |
dc.contributor.author | Phatak, Dhananjay S. | |
dc.contributor.author | Sherman, Alan T. | |
dc.date.accessioned | 2019-03-05T20:35:18Z | |
dc.date.available | 2019-03-05T20:35:18Z | |
dc.description.abstract | Private Virtual Infrastructure is a security architecture for cloud computing which uses a new trust model to share the responsibility of security in cloud computing between the service provider and client, decreasing the risk exposure to both. Private Virtual Infrastructure is under control of the information owner while the cloud fabric is under control of the service provider. The Private Virtual Infrastructure architecture comprises a cluster of trusted computing fabric platforms that host virtual servers running an application server with a Locator Bot security service. The cloud Locator Bot pre-measures the cloud platform for security properties to determine the trustworthiness of the platform. The Locator Bot uses Trusted Execution Technology and virtual Trusted Platform Modules to pre-measure the target environment and securely provision the Private Virtual Infrastructure in the cloud thus protecting information by preventing data from being placed in malicious or untrusted environments. Private Virtual Infrastructure — including Locator Bot — provides organizations tools to maintain control of their information in the cloud and realize benefits of cloud computing, with assurance that their information is protected. This paper presents a cloud trust model, Private Virtual Infrastructure architecture, and a Locator Bot protocol in enough detail to support further analysis or implementation. | en_US |
dc.description.sponsorship | Krautheim and Sherman were supported in part by the Department of Defense under Information Assurance Scholarship Program grants H98230-08-1-0334 and H98230-09-1-0404. | en_US |
dc.description.uri | https://cisa.umbc.edu/files/2017/09/krautheim_tr-cs-10-04.pdf | en_US |
dc.format.extent | 36 pages | en_US |
dc.genre | technical reports | en_US |
dc.identifier | doi:10.13016/m21s88-kihy | |
dc.identifier.uri | http://hdl.handle.net/11603/12946 | |
dc.language.iso | en_US | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Center for Research and Exploration in Space Sciences & Technology II (CRSST II) | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department | |
dc.relation.ispartofseries | Technical Report;TR-CS-10-04 | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.subject | cloud computing | en_US |
dc.subject | security | en_US |
dc.subject | architecture | en_US |
dc.subject | virtualization | en_US |
dc.subject | trusted Computing | en_US |
dc.subject | trusted platform module | en_US |
dc.subject | networking | en_US |
dc.title | Private Virtual Infrastructure: A Model for Trustworthy Utility Cloud Computing | en_US |
dc.type | Text | en_US |