Accountability in Cloud Computing by Means of Chain of Trust

Cloud computing offers various services in form of infrastructure, platform, and software to meet the consumer requirements. It is radically changing how information technology services are created, delivered, accessed, and managed. However, this swift has prompted concerns regarding security and privacy due to cloud computing characteristics such as the multi-tenancy, elasticity, and layered architecture. One of the major challenge is to offer accountability in cloud services across all the dependencies. When one entity relies on other entities for functioning, it creates a dependency in system and makes it difficult to sort out the responsible entity among them. In this paper, we analyze the problem of creating accountable cloud services. We utilize basic functionality provided by Trusted Computing Group (TCG) in form of chain of trust (CoT) by securely recording identities (of entities). We propose a solution that modifies existing chain of trust to build accountable cloud computing. We explore dependency relationship in building reliable chain of trust in cloud and define it for better implementation.

[1]  Jeffrey S. Chase,et al.  Trust but verify: accountability for network services , 2004, EW 11.

[2]  Alexander Nakhimovsky,et al.  Google, Amazon, and Beyond: Creating and Consuming Web Services , 2003, Apress.

[3]  Claire Vishik,et al.  TPM Virtualization: Building a General Framework , 2008 .

[4]  Liang-Jie Zhang,et al.  CCOA: Cloud Computing Open Architecture , 2009, 2009 IEEE International Conference on Web Services.

[5]  Sean W. Smith Trusted Computing Platforms - Design and Applications , 2005 .

[6]  Siani Pearson,et al.  Towards a model of accountability for cloud computing services , 2013 .

[7]  John Zic,et al.  Accountability as a Service for the Cloud , 2010, 2010 IEEE International Conference on Services Computing.

[8]  Siani Pearson,et al.  Towards Accountability in the Cloud , 2011 .

[9]  Stefan Berger,et al.  vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.

[10]  Jitendra Singh,et al.  Cyber-Attacks in Cloud Computing: A Case Study , 2014 .

[11]  David Caplan,et al.  SELinux by Example: Using Security Enhanced Linux (Prentice Hall Open Source Software Development Series) , 2006 .

[12]  Wang Zhenyu,et al.  A Policy-based De-duplication Mechanism for Securing Cloud Storage , 2015 .

[13]  S. Sitkin,et al.  Explaining the Limited Effectiveness of Legalistic “Remedies” for Trust/Distrust , 1993 .

[14]  Sean W. Smith,et al.  Building the IBM 4758 Secure Coprocessor , 2001, Computer.

[15]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[16]  Trent Jaeger,et al.  Seeding clouds with trust anchors , 2010, CCSW '10.

[17]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[18]  Imad M. Abbadi Clouds Trust Anchors , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[19]  Dhiren R. Patel,et al.  Analyzing trustworthiness of virtual machines in data-intensive cloud computing , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.

[20]  Siani Pearson,et al.  A Metamodel for Measuring Accountability Attributes in the Cloud , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[21]  John C. Grundy,et al.  An Analysis of the Cloud Computing Security Problem , 2016, APSEC 2010.

[22]  Tim Mather,et al.  Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.

[23]  Martin Gilje Jaatun,et al.  Accountability for cloud and other future Internet services , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.