11 research outputs found
Deploying Virtual Machines on Shared Platforms
In this report, we describe mechanisms for secure deployment of virtual machines on shared platforms looking into a telecommunication cloud use case, which is also presented in this report. The architecture we present focuses on the security requirements of the major stakeholders’ part of the scenario we present. This report comprehensively covers all major security aspects including different security mechanisms and protocols, leveraging existing standards and state-of-the art wherever applicable. In particular, our architecture uses TCG technologies for trust establishment in the deployment of operator virtual machines on shared resource platforms. We also propose a novel procedure for securely launching and cryptographically binding a virtual machine to a target platform thereby protecting the operator virtual machine and its related credentials
Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud
In this paper we consider the Infrastructure-as-a-Service (IaaS) cloud model which allows cloud users to run their own virtual machines (VMs) on available cloud computing resources. IaaS gives enterprises the possibility to outsource their process workloads with minimal effort and expense. However, one major problem with existing approaches of cloud leasing, is that the users can only get contractual guarantees regarding the integrity of the offered platforms. The fact that the IaaS user himself or herself cannot verify the provider promised cloud platform integrity, is a security risk which threatens to prevent the IaaS business in general. In this paper we address this issue and propose a novel secure VM launch protocol using Trusted Computing techniques. This protocol allows the cloud IaaS users to securely bind the VM to a trusted computer configuration such that the clear text VM only will run on a platform that has been booted into a trustworthy state. This capability builds user confidence and can serve as an important enabler for creating trust in public clouds. We evaluate the feasibility of our proposed protocol via a full scale system implementation and perform a system security analysis
An efficient, secure and trusted channel protocol for avionics wireless networks
Avionics networks rely on a set of stringent reliability and safety
requirements. In existing deployments, these networks are based on a wired
technology, which supports these requirements. Furthermore, this technology
simplifies the security management of the network since certain assumptions can
be safely made, including the inability of an attacker to access the network,
and the fact that it is almost impossible for an attacker to introduce a node
into the network. The proposal for Avionics Wireless Networks (AWNs), currently
under development by multiple aerospace working groups, promises a reduction in
the complexity of electrical wiring harness design and fabrication, a reduction
in the total weight of wires, increased customization possibilities, and the
capacity to monitor otherwise inaccessible moving or rotating aircraft parts
such as landing gear and some sections of the aircraft engines. While providing
these benefits, the AWN must ensure that it provides levels of safety that are
at minimum equivalent to those offered by the wired equivalent. In this paper,
we propose a secure and trusted channel protocol that satisfies the stated
security and operational requirements for an AWN protocol. There are three main
objectives for this protocol. First, the protocol has to provide the assurance
that all communicating entities can trust each other, and can trust their
internal (secure) software and hardware states. Second, the protocol has to
establish a fair key exchange between all communicating entities so as to
provide a secure channel. Finally, the third objective is to be efficient for
both the initial start-up of the network and when resuming a session after a
cold and/or warm restart of a node. The proposed protocol is implemented and
performance measurements are presented based on this implementation. In
addition, we formally verify our proposed protocol using CasperFDR.Comment: 10 pages, 2 figures, 4 tables, IEEE DAS
A SURVEY ON ENCRYPTION ALGORITHMS AND PROTOCOLS IN SMART CARD FOR USER CENTRIC OWNERSHIP MODEL
User Centric Ownership Model (UCOM) enables the smart card users to install/delete application they prefer in their smart card. UCOM provides smart card users to have any number of applications installed on their smart cards. Though UCOM provides flexibility for the smart card users, it lacks centralized authority. UCOM creates major problem if the user has more than one application installed in his/her smart card. Smart card may contain applications from the provider that may interrupt the proper working of the neighbor applications. Smart card user may hack his way to a known aboutapplication through a smart card simulator. Thus, there is no security for an application in the smart card for UCOM model. This survey paper includes background and motivation about the available encryption algorithms for smart cards such as RSA, ECC, AES, DES, T-DES, ECDSA and the smart card protocols which can be used to overcome the problem of security for the applications in smart card for UCOM model