Hardware-based solutions for trusted cloud computing
نویسندگان
چکیده
The increasing number of threats targeting cloud computing and the exploitation specifically privileged software vulnerabilities have pushed security managers service providers to deploy hardware-based solutions. These solutions can offer better hardware-assisted features for a broad range platforms including both CISC RISC architecture families in datacenters. Their goal is reduce attack surface by rooting trust into hardware instead some high-privileged pieces system such as operating or hypervisor which been demonstrated that they include severe vulnerabilities, thus limiting adoption model security-skeptical users. In this paper, we give users customers, application developers comprehensive overview four major industrial-scale commercial brought vendors market. We present, analyze compare Intel TXT, ARM TrustZone, AMD SEV, SGX technologies with respect more than twenty criteria fitting within three categories: security, functional deployment. discuss each these show cases where particularly excel. Our comparison help IT take right decision about industrial technology adopt their particular requirements future migrations.
منابع مشابه
Towards Trusted Cloud Computing
Cloud computing infrastructures enable companies to cut costs by outsourcing computations on-demand. However, clients of cloud computing services currently have no means of verifying the confidentiality and integrity of their data and computation. To address this problem we propose the design of a trusted cloud computing platform (TCCP). TCCP enables Infrastructure as a Service (IaaS) providers...
متن کاملTrusted Computing: Challenges & Solutions
Most citizens of the world today are fighting for – either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy and extract confidential information. With these worries in mind, the Trusted Computing Group (TCG) was established to develop specifications for trusted computing building blocks and software interfaces that could address the problems ...
متن کاملTrusted Computing Strengthens Cloud Authentication
Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust M...
متن کاملExperiences in Trusted Cloud Computing
While trusted computing is a well-known technology, its role has been relatively limited in scope and typically limited to single machines. The advent of cloud computing, its role as critical infrastructure and the requirement for trust between the users of computing resources combines to form a perfect environment for trusted and high-integrity computing. Indeed, the use of trusted computing i...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2021
ISSN: ['0167-4048', '1872-6208']
DOI: https://doi.org/10.1016/j.cose.2020.102117