direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Page Content

Publications of KBS

How do you know that your cloud operator does not cheat?
Citation key Schneider2012a
Author Jörg Schneider
Title of Book Workshop on Service Science and Engineering
Year 2012
Location Shanghai, CN
Publisher Springer
How Published accepted
Abstract The security of a system is usually based on the physical security of the hardware. In a Cloud setup, this basic assumption cannot be assured as the system runs as a virtual machine (VM) on the operator’s hardware. The operator has access to all files, has access to the main memory, can interfere with the communication, and can manipulate the control flow. The Cloud operator can even hide manipulations by creating a virtual view for the user. In the talk, I will show how the security goals confidentiality, integrity, and availability can be violated by the Cloud provider. The user may not be able to prevent such manipulations, but can sign a service level agreement (SLA) and negotiate fines to be paid. For the Cloud operator, the manipulations are no longer lucrative if the risk to be discovered and the fine is high enough. However, a mechanism is needed to detect an attack reliably to enforce the SLA. I will present such detection mechanisms for various attack types and analyze how a bogus Cloud operator may still avoid the detection.
Download Bibtex entry

Zusatzinformationen / Extras

Quick Access:

Schnellnavigation zur Seite über Nummerneingabe