Private Virtual Infrastructure: A Model for Trustworthy Utility Cloud Computing

dc.contributor.authorKrautheim, F. John
dc.contributor.authorPhatak, Dhananjay S.
dc.contributor.authorSherman, Alan T.
dc.date.accessioned2019-03-05T20:35:18Z
dc.date.available2019-03-05T20:35:18Z
dc.description.abstractPrivate Virtual Infrastructure is a security architecture for cloud computing which uses a new trust model to share the responsibility of security in cloud computing between the service provider and client, decreasing the risk exposure to both. Private Virtual Infrastructure is under control of the information owner while the cloud fabric is under control of the service provider. The Private Virtual Infrastructure architecture comprises a cluster of trusted computing fabric platforms that host virtual servers running an application server with a Locator Bot security service. The cloud Locator Bot pre-measures the cloud platform for security properties to determine the trustworthiness of the platform. The Locator Bot uses Trusted Execution Technology and virtual Trusted Platform Modules to pre-measure the target environment and securely provision the Private Virtual Infrastructure in the cloud thus protecting information by preventing data from being placed in malicious or untrusted environments. Private Virtual Infrastructure — including Locator Bot — provides organizations tools to maintain control of their information in the cloud and realize benefits of cloud computing, with assurance that their information is protected. This paper presents a cloud trust model, Private Virtual Infrastructure architecture, and a Locator Bot protocol in enough detail to support further analysis or implementation.en
dc.description.sponsorshipKrautheim and Sherman were supported in part by the Department of Defense under Information Assurance Scholarship Program grants H98230-08-1-0334 and H98230-09-1-0404.en
dc.description.urihttps://cisa.umbc.edu/files/2017/09/krautheim_tr-cs-10-04.pdfen
dc.format.extent36 pagesen
dc.genretechnical reportsen
dc.identifierdoi:10.13016/m21s88-kihy
dc.identifier.urihttp://hdl.handle.net/11603/12946
dc.language.isoenen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Center for Research and Exploration in Space Sciences & Technology II (CRSST II)
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department
dc.relation.ispartofseriesTechnical Report;TR-CS-10-04
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.subjectcloud computingen
dc.subjectsecurityen
dc.subjectarchitectureen
dc.subjectvirtualizationen
dc.subjecttrusted Computingen
dc.subjecttrusted platform moduleen
dc.subjectnetworkingen
dc.titlePrivate Virtual Infrastructure: A Model for Trustworthy Utility Cloud Computingen
dc.typeTexten

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
krautheim_tr-cs-10-04.pdf
Size:
453.66 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: