Supplemental Material: Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

نویسندگان

  • Juan Du
  • Daniel J. Dean
  • Yongmin Tan
  • Ting Yu
چکیده

Proof: We can prove Proposition 1 by contradiction. Suppose the number of malicious service providers is less than |CG|. Then the graph formed by malicious nodes cannot cover the entire graph, which means there exists one edge that is not incident to any of the malicious nodes. Thus, the edge must be incident to two benign nodes. Since two benign nodes always agree with each other, this contradicts with the existence of an inconsistency link between them.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trustworthy services through attestation

Remote attestation is a promising mechanism for assurance of distributed systems. It allows users to identify the software running on a remote system before trusting it with an important task. This functionality is arriving at exactly the right time as security-critical systems, such as healthcare and financial services, are increasingly being hosted online. However, attestation has limitations...

متن کامل

Intel SGX Enabled Key Manager Service with OpenStack Barbican

Protecting data in the cloud continues to gain in importance, with encryption being used to achieve the desired data protection. While there is desire to use encryption, various cloud components do not want to deal with key management, which points to a strong need for a separate key management system. OpenStack Barbican is a platform developed by the OpenStack community aimed at providing cryp...

متن کامل

Maat: A Platform Service for Measurement and Attestation

Software integrity measurement and attestation (M&A) are critical technologies for evaluating the trustworthiness of software platforms. To best support these technologies, next generation systems must provide a centralized service for securely selecting, collecting, and evaluating integrity measurements. Centralization of M&A avoids duplication, minimizes security risks to the system, and ensu...

متن کامل

A Business Model for Cloud-Based Autonomous Logistics

Cloud computing denotes a paradigm shift in computing that enables a flexible allocation of hardware and software resources on demand. Therewith, it is particularly appealing for applications with a high degree of computational complexity and dynamics. This paper identifies logistics planning and control as a promising application for clouds. However, two prerequisites must be met for cloud-bas...

متن کامل

Towards Fourth-party Logistics Providers - A Business Model for Cloud-based Autonomous Logistics

Cloud computing denotes a paradigm shift in computing that enables a flexible allocation of hardware and software resources on demand. Therewith, it is particularly appealing for applications with a high degree of computational complexity and dynamics. This paper identifies logistics planning and control as a promising application for clouds. However, two prerequisites must be met for cloud-bas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013