Title: User-policy-based dynamic remote attestation in cloud computing

Authors: Haihe Ba; Jiangchun Ren; Zhiying Wang; Huaizhe Zhou; Yiming Li; Tie Hong

Addresses: College of Computer, National University of Defense Technology, Changsha, Hunan, China ' College of Computer, National University of Defense Technology, Changsha, Hunan, China ' College of Computer, National University of Defense Technology, Changsha, Hunan, China ' College of Computer, National University of Defense Technology, Changsha, Hunan, China ' College of Computer, National University of Defense Technology, Changsha, Hunan, China ' College of Computer, National University of Defense Technology, Changsha, Hunan, China

Abstract: As one of the most influential technologies, cloud computing brings users more benefits and improves the efficiency of computing in comparison to the traditional model. However, it also introduces a number of unknown risks and challenges, upon which effectiveness and efficiency of those traditional security protection solutions could have very little influence. We introduce DTEM into JVM, which gives robust trust guarantees to Java applications and makes a dynamic attestation about the integrity state of the current applications. DTEM advanced the state of the art in trusted computing and is designed to tackle the dynamic issues by verifying the runtime bytecode integrity of these applications in cloud environments. DTEM not only provides user-defined policy to determine the complexity of integrity checks and the frequency of their executions, but also enhances the availability to pledge the continuous business. What is more, it has less impact on execution performance of cloud applications.

Keywords: cloud computing; root of trust; DTEM; JVM; Java virtual machine; user-defined policy; dynamic remote attestation; Java applications; trust guarantees.

DOI: 10.1504/IJES.2016.073751

International Journal of Embedded Systems, 2016 Vol.8 No.1, pp.39 - 45

Received: 30 Jun 2014
Accepted: 31 Oct 2014

Published online: 17 Dec 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article