Multi-dimensional key generation of ICMetrics for cloud computing

Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service. This paper explores an approach to assure trust and provenance in cloud based services via the generation of digital signatures using properties or features derived from their own construction and software behaviour. The resulting system removes the need for a server to store a private key in a typical Public/Private-Key Infrastructure for data sources. Rather, keys are generated at run-time by features obtained as service execution proceeds. In this paper we investigate several potential software features for suitability during the employment of a cloud service identification system. The generation of stable and unique digital identity from features in Cloud computing is challenging because of the unstable operation environments that implies the features employed are likely to vary under normal operating conditions. To address this, we introduce a multi-dimensional key generation technology which maps from multi-dimensional feature space directly to a key space. Subsequently, a smooth entropy algorithm is developed to evaluate the entropy of key space.

[1]  Klaus D. Maier On-chip debug support for embedded Systems-on-Chip , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[2]  Miodrag Potkonjak,et al.  Device aging-based physically unclonable functions , 2011, 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC).

[3]  Franck Cappello,et al.  9th IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGrid 2009, Shanghai, China, 18-21 May 2009 , 2009, CCGRID.

[4]  W. Gareth J. Howells,et al.  Normalizing Discrete Circuit Features with Statistically Independent values for incorporation within a highly Secure Encryption System , 2007, Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007).

[5]  Josh Benaloh,et al.  Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.

[6]  W. Gareth J. Howells,et al.  Key Generation for Secure Inter-satellite Communication , 2007, Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007).

[7]  B. Chen,et al.  Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).

[8]  Sencun Zhu,et al.  Behavior based software theft detection , 2009, CCS.

[9]  Victor Yu. Krachkovsky Reed-Solomon codes for correcting phased error bursts , 2003, IEEE Trans. Inf. Theory.

[10]  Richard Wolski,et al.  The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[11]  Andrew Warfield,et al.  Xen and the art of virtualization , 2003, SOSP '03.

[12]  Michael K. Reiter,et al.  The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.

[13]  M. Desnoyers LTTng: Tracing across execution layers, from the Hypervisor to user-space , 2008 .

[14]  Klaus D. McDonald-Maier,et al.  Overview of ICmetrics Technology – Security Infrastructure for Autonomous and Intelligent Healthcare System , 2011 .

[15]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[16]  Christopher Krügel,et al.  Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.

[17]  Klaus D. McDonald-Maier,et al.  An ICMetrics Based Lightweight Security Architecture Using Lattice Signcryption , 2012, 2012 Third International Conference on Emerging Security Technologies.

[18]  Dongbing Gu,et al.  Program Counter as an Integrated Circuit Metrics for Secured Program Identification , 2013, 2013 Fourth International Conference on Emerging Security Technologies.

[19]  W. Gareth J. Howells,et al.  Integrating Feature Values for Key Generation in an ICmetric System , 2009, 2009 NASA/ESA Conference on Adaptive Hardware and Systems.