Introducing the trusted virtual environment module: A new mechanism for rooting trust in cloud computing

Frank John Krautheim, Dhananjay S. Phatak, Alan T. Sherman

Research output: Chapter in Book/Report/Conference proceedingConference contribution

57 Citations (Scopus)

Abstract

We introduce a new mechanism for rooting trust in a cloud computing environment called the Trusted Virtual Environment Module (TVEM). The TVEM helps solve the core security challenge of cloud computing by enabling parties to establish trust relationships where an information owner creates and runs a virtual environment on a platform owned by a separate service provider. The TVEM is a software appliance that provides enhanced features for cloud virtual environments over existing Trusted Platform Module virtualization techniques, which includes an improved application program interface, cryptographic algorithm flexibility, and a configurable modular architecture. We define a unique Trusted Environment Key that combines trust from the information owner and the service provider to create a dual root of trust for the TVEM that is distinct for every virtual environment and separate from the platform's trust. This paper presents the requirements, design, and architecture of our approach.

Original languageEnglish (US)
Title of host publicationTrust and Trustworthy Computing - Third International Conference, TRUST 2010, Proceedings
Pages211-227
Number of pages17
DOIs
StatePublished - Jul 23 2010
Event3rd International Conference on Trust and Trustworthy Computing, TRUST 2010 - Berlin, Germany
Duration: Jun 21 2010Jun 23 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6101 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other3rd International Conference on Trust and Trustworthy Computing, TRUST 2010
CountryGermany
CityBerlin
Period6/21/106/23/10

Fingerprint

Cloud computing
Virtual Environments
Cloud Computing
Virtual reality
Module
Virtualization
Application programs
Interfaces (computer)
Flexibility
Roots
Distinct
Software
Requirements

Keywords

  • TPM
  • cloud computing
  • security
  • trust
  • virtualization

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Krautheim, F. J., Phatak, D. S., & Sherman, A. T. (2010). Introducing the trusted virtual environment module: A new mechanism for rooting trust in cloud computing. In Trust and Trustworthy Computing - Third International Conference, TRUST 2010, Proceedings (pp. 211-227). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6101 LNCS). https://doi.org/10.1007/978-3-642-13869-0_14

Introducing the trusted virtual environment module : A new mechanism for rooting trust in cloud computing. / Krautheim, Frank John; Phatak, Dhananjay S.; Sherman, Alan T.

Trust and Trustworthy Computing - Third International Conference, TRUST 2010, Proceedings. 2010. p. 211-227 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6101 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Krautheim, FJ, Phatak, DS & Sherman, AT 2010, Introducing the trusted virtual environment module: A new mechanism for rooting trust in cloud computing. in Trust and Trustworthy Computing - Third International Conference, TRUST 2010, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6101 LNCS, pp. 211-227, 3rd International Conference on Trust and Trustworthy Computing, TRUST 2010, Berlin, Germany, 6/21/10. https://doi.org/10.1007/978-3-642-13869-0_14
Krautheim FJ, Phatak DS, Sherman AT. Introducing the trusted virtual environment module: A new mechanism for rooting trust in cloud computing. In Trust and Trustworthy Computing - Third International Conference, TRUST 2010, Proceedings. 2010. p. 211-227. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-13869-0_14
Krautheim, Frank John ; Phatak, Dhananjay S. ; Sherman, Alan T. / Introducing the trusted virtual environment module : A new mechanism for rooting trust in cloud computing. Trust and Trustworthy Computing - Third International Conference, TRUST 2010, Proceedings. 2010. pp. 211-227 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{70f9aec0bcca4a51ad8f4c6f9deeb1c1,
title = "Introducing the trusted virtual environment module: A new mechanism for rooting trust in cloud computing",
abstract = "We introduce a new mechanism for rooting trust in a cloud computing environment called the Trusted Virtual Environment Module (TVEM). The TVEM helps solve the core security challenge of cloud computing by enabling parties to establish trust relationships where an information owner creates and runs a virtual environment on a platform owned by a separate service provider. The TVEM is a software appliance that provides enhanced features for cloud virtual environments over existing Trusted Platform Module virtualization techniques, which includes an improved application program interface, cryptographic algorithm flexibility, and a configurable modular architecture. We define a unique Trusted Environment Key that combines trust from the information owner and the service provider to create a dual root of trust for the TVEM that is distinct for every virtual environment and separate from the platform's trust. This paper presents the requirements, design, and architecture of our approach.",
keywords = "TPM, cloud computing, security, trust, virtualization",
author = "Krautheim, {Frank John} and Phatak, {Dhananjay S.} and Sherman, {Alan T.}",
year = "2010",
month = "7",
day = "23",
doi = "10.1007/978-3-642-13869-0_14",
language = "English (US)",
isbn = "3642138683",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "211--227",
booktitle = "Trust and Trustworthy Computing - Third International Conference, TRUST 2010, Proceedings",

}

TY - GEN

T1 - Introducing the trusted virtual environment module

T2 - A new mechanism for rooting trust in cloud computing

AU - Krautheim, Frank John

AU - Phatak, Dhananjay S.

AU - Sherman, Alan T.

PY - 2010/7/23

Y1 - 2010/7/23

N2 - We introduce a new mechanism for rooting trust in a cloud computing environment called the Trusted Virtual Environment Module (TVEM). The TVEM helps solve the core security challenge of cloud computing by enabling parties to establish trust relationships where an information owner creates and runs a virtual environment on a platform owned by a separate service provider. The TVEM is a software appliance that provides enhanced features for cloud virtual environments over existing Trusted Platform Module virtualization techniques, which includes an improved application program interface, cryptographic algorithm flexibility, and a configurable modular architecture. We define a unique Trusted Environment Key that combines trust from the information owner and the service provider to create a dual root of trust for the TVEM that is distinct for every virtual environment and separate from the platform's trust. This paper presents the requirements, design, and architecture of our approach.

AB - We introduce a new mechanism for rooting trust in a cloud computing environment called the Trusted Virtual Environment Module (TVEM). The TVEM helps solve the core security challenge of cloud computing by enabling parties to establish trust relationships where an information owner creates and runs a virtual environment on a platform owned by a separate service provider. The TVEM is a software appliance that provides enhanced features for cloud virtual environments over existing Trusted Platform Module virtualization techniques, which includes an improved application program interface, cryptographic algorithm flexibility, and a configurable modular architecture. We define a unique Trusted Environment Key that combines trust from the information owner and the service provider to create a dual root of trust for the TVEM that is distinct for every virtual environment and separate from the platform's trust. This paper presents the requirements, design, and architecture of our approach.

KW - TPM

KW - cloud computing

KW - security

KW - trust

KW - virtualization

UR - http://www.scopus.com/inward/record.url?scp=77954729866&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77954729866&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-13869-0_14

DO - 10.1007/978-3-642-13869-0_14

M3 - Conference contribution

AN - SCOPUS:77954729866

SN - 3642138683

SN - 9783642138683

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 211

EP - 227

BT - Trust and Trustworthy Computing - Third International Conference, TRUST 2010, Proceedings

ER -