SlideShare une entreprise Scribd logo
1  sur  21
How to Secure Infrastructure Clouds with Trusted
           Computing Technologies

                      Nicolae Paladi

            Swedish Institute of Computer Science
2



Contents


           1. Infrastructure-as-a-Service
           2. Security challenges of IaaS
           3. Trusted Computing and TPM
           4. Trusted VM launch
           5. InfraCloud
           6. Future work
3



Infrastructure-as-a-Service
• A 'cloud computing' service model (NIST:2011):

   Provision processing, storage, networks.

   Deploy and run arbitrary software.

   No control over underlying cloud infrastructure.

   Control over OS, storage, deployed applications.

   Limited control of select networking components.
4

Infrastructure-as-a-Service
architectural overview




               OpenStack architectural overview
    https://wiki.openstack.org/wiki/ArchitecturalOverview
5

Infrastructure-as-a-Service
security issues
                                                             2011: Vulnerabilities in
                                                              the AWS management
                                                              console (XSS and XML
                                                              wrapping attacks)




               OpenStack architectural overview
    https://wiki.openstack.org/wiki/ArchitecturalOverview
6

Infrastructure-as-a-Service
security issues
                                                             2011: Vulnerabilities in
                                                              the AWS management
                                                              console (XSS and XML
                                                              wrapping attacks)

                                                             2012: Cross-VM Side
                                                              Channels can be used
                                                              to extract private keys.




               OpenStack architectural overview
    https://wiki.openstack.org/wiki/ArchitecturalOverview
7

Infrastructure-as-a-Service
security issues
                                                             2011: Vulnerabilities in
                                                              the AWS management
                                                              console (XSS and XML
                                                              wrapping attacks)

                                                             2012: Cross-VM Side
                                                              Channels can be used
                                                              to extract private keys

                                                             2012: Rackspace’s
                                                              “dirty disks”



               OpenStack architectural overview
    https://wiki.openstack.org/wiki/ArchitecturalOverview
8




Can we help it?
9


    Introducing the TPM
    Trusted platform module v1.2 as specified by TCG.
    v2.0 is currently under review.
    Tamper-evident.
    16+ PCRs for volatile storage.
    Four operations: Signing / Binding / Sealing /
     Sealed-sign.
10


    Introducing the TPM: output
•   Produces integrity measurements of the firmware at
    boot time.
   Can produce integrity measurements of the loaded
    kernel modules (sample below).
11


 Introducing the TPM: usage

• Microsoft BitLocker

• Google Chromium OS

• Citrix XenServer

• Oracle’s X- and T-Series Systems

• HP ProtectTools

• Others
12


Securing IaaS environments
with trusted computing
•   Virtualization security.

•   Storage protection in IaaS environments.

•   Computing security in IaaS environments.

•   Remote host software integrity attestation.

•   Runtime host software integrity attestation.

•   Encryption key management in IaaS environments.
13


Computing security in
IaaS environments: Problem Setting
• “Consumer is able to deploy and run arbitrary software,
    which can include operating systems and applications.”

   Client can launch VMs for sensitive computations.
   Trusted VM launch – the correct VM is launched in a IaaS
    platform on a host with a known software stack verified to
    not have been modified by malicious actors.
   IaaS security with trusted computing.
   How do we ensure a trusted VM launch in an untrusted
    IaaS environment?
14



Attack scenario 1
                                     Remote attacker
                                          (Ar)
                       Scheduler
                          (S)
                                              Ar could schedule
                                              the VM instance to
                                              be launched on a
                                              compromised host



                    Trusted
                    Compute         Compute
                     Host            Host
                     (CH)            (CH)



                Hardware           Hardware      Hardware
Client (C)
15



Attack scenario 2
                                              Remote attacker
                                                   (Ar)
                                Scheduler
                                   (S)




                             Trusted
                             Compute         Compute       Compute
                              Host            Host          Host
                              (CH)            (CH)          (CH)
             Ar could
             compromise
             the VM image
             prior to       Hardware        Hardware     Hardware
             launch
Client (C)
16


Trusted VM launch protocol


• Ensure VM image launched on a trusted host.
• Ensure communication with VM launched on a trusted
  CH rather than a random VM.
• Compute host to verify the integrity VM image to be
  launched.
• Minimum implementation footprint on the IaaS
  codebase.
• Transparent view of the secure launch procedures.
Protocol: birds-eye view
                   3.         (S)


  1.


                                    4.
                                         5.
         2.



                                              6.
              CH         CH         CH


                                HW
              HW        HW       +
Client (C)                      TPM
18




Prototype implementation
•    OpenStack cluster deployed on 3 nodes (TPM-equipped)

•    Code extensions:
    • Changes OpenStack launch procedure.
    • Implementation of an OpenStack–TPM communication
      “glue”.
    • Implementation of a TTP (interpretation of attestation info)
    • Implementation of client-side functionality (token generation,
      trusted launch verification).
19



Securing IaaS with InfraCloud:
The project
 • Ongoing project in collaboration between
   Region Skåne, Ericsson Research and SICS.

 • Aim: proof of concept design and deployment
   of one of the region’s medical journaling
   systems in a hardened and trustworthy
   IaaS environment.

 • Prototype implementation based on earlier
   research, as well as solutions to newly
   identified challenges.
20



Securing IaaS with InfraCloud:
The challenges
 Numerous new research challenges have been identified
 already in the early stages of the project:

 • Storage protection in untrusted IaaS environments.
 • Verification and protection of a deployment’s network
     configuration.
 •   Runtime VM instance protection (prevent memory dumping,
     cloning).
 •   Secure key handling mechanisms in untrusted IaaS
     deployments.
 •   Update and patch deployment on guest VM instances.
 •   Interpretation of TPM attestation data.
21



Conclusion
• Out-of-the-box public IaaS probably not acceptable
    for most organizations handling sensitive data.
•   A comprehensive solution for data protection in public
    IaaS environments has not been found yet.
•   SICS Secure Systems lab works with various aspects
    of guest protection in untrusted IaaS.
•   Trusted Computing Technologies allow to address
    some of the issues with IaaS security.
•   Participation in the InfraCloud project and practical
    application of protocols reveal multiple new research
    challenges.

Contenu connexe

Tendances

Cloud security
Cloud securityCloud security
Cloud security
insoonjo
 
Hitchhiker's Guide to Open Source Cloud Computing
Hitchhiker's Guide to Open Source Cloud ComputingHitchhiker's Guide to Open Source Cloud Computing
Hitchhiker's Guide to Open Source Cloud Computing
Mark Hinkle
 
Cloud Computing Hypervisors and Comparison Xen KVM
Cloud Computing Hypervisors and Comparison Xen KVM Cloud Computing Hypervisors and Comparison Xen KVM
Cloud Computing Hypervisors and Comparison Xen KVM
cloudresearcher
 

Tendances (20)

CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...
CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...
CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...
 
Scale 12x Securing Your Cloud with The Xen Hypervisor
Scale 12x Securing Your Cloud with The Xen HypervisorScale 12x Securing Your Cloud with The Xen Hypervisor
Scale 12x Securing Your Cloud with The Xen Hypervisor
 
Unikraft Landing Page Master Slides
Unikraft Landing Page Master SlidesUnikraft Landing Page Master Slides
Unikraft Landing Page Master Slides
 
Presentation cloud orchestration
Presentation   cloud orchestrationPresentation   cloud orchestration
Presentation cloud orchestration
 
ttec vSphere 5
ttec vSphere 5ttec vSphere 5
ttec vSphere 5
 
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
 
LCC17 - Live Patching, Virtual Machine Introspection and Vulnerability Manag...
LCC17 -  Live Patching, Virtual Machine Introspection and Vulnerability Manag...LCC17 -  Live Patching, Virtual Machine Introspection and Vulnerability Manag...
LCC17 - Live Patching, Virtual Machine Introspection and Vulnerability Manag...
 
Security in a Virtualised Environment
Security in a Virtualised EnvironmentSecurity in a Virtualised Environment
Security in a Virtualised Environment
 
Vsp 40 admin_guide
Vsp 40 admin_guideVsp 40 admin_guide
Vsp 40 admin_guide
 
Windows server 2012 failover clustering improvements
Windows server 2012   failover clustering improvementsWindows server 2012   failover clustering improvements
Windows server 2012 failover clustering improvements
 
Cloud security
Cloud securityCloud security
Cloud security
 
LCC17 - Securing Embedded Systems with the Hypervisor - Lars Kurth, Citrix
LCC17 - Securing Embedded Systems with the Hypervisor - Lars Kurth, CitrixLCC17 - Securing Embedded Systems with the Hypervisor - Lars Kurth, Citrix
LCC17 - Securing Embedded Systems with the Hypervisor - Lars Kurth, Citrix
 
2009 Cms Conference VMware overview
2009 Cms Conference VMware overview2009 Cms Conference VMware overview
2009 Cms Conference VMware overview
 
CloudStack Performance Testing
CloudStack Performance TestingCloudStack Performance Testing
CloudStack Performance Testing
 
Hitchhiker's Guide to Open Source Cloud Computing
Hitchhiker's Guide to Open Source Cloud ComputingHitchhiker's Guide to Open Source Cloud Computing
Hitchhiker's Guide to Open Source Cloud Computing
 
XPDS14: OpenXT - Security and the Properties of a Xen Virtualisation Platform...
XPDS14: OpenXT - Security and the Properties of a Xen Virtualisation Platform...XPDS14: OpenXT - Security and the Properties of a Xen Virtualisation Platform...
XPDS14: OpenXT - Security and the Properties of a Xen Virtualisation Platform...
 
Presentation cloud orchestration solution overview
Presentation   cloud orchestration solution overviewPresentation   cloud orchestration solution overview
Presentation cloud orchestration solution overview
 
Hypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong KongHypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong Kong
 
Hcx intro preso v2
Hcx intro preso v2Hcx intro preso v2
Hcx intro preso v2
 
Cloud Computing Hypervisors and Comparison Xen KVM
Cloud Computing Hypervisors and Comparison Xen KVM Cloud Computing Hypervisors and Comparison Xen KVM
Cloud Computing Hypervisors and Comparison Xen KVM
 

Similaire à Lund security workshop_presentation

Openstack Diablo Survey
Openstack Diablo SurveyOpenstack Diablo Survey
Openstack Diablo Survey
Pjack Chen
 
Exploration of eucalyptus_v2.0
Exploration of eucalyptus_v2.0Exploration of eucalyptus_v2.0
Exploration of eucalyptus_v2.0
huangwenjun310
 

Similaire à Lund security workshop_presentation (20)

Anatomy of a Build Server Attack
Anatomy of a Build Server AttackAnatomy of a Build Server Attack
Anatomy of a Build Server Attack
 
Rutgers Cloud Seminar 2017
Rutgers Cloud Seminar 2017Rutgers Cloud Seminar 2017
Rutgers Cloud Seminar 2017
 
Rutgers Cloud Seminar 2017
Rutgers Cloud Seminar 2017Rutgers Cloud Seminar 2017
Rutgers Cloud Seminar 2017
 
Cloud Computing Tools
Cloud Computing ToolsCloud Computing Tools
Cloud Computing Tools
 
Openstack Diablo Survey
Openstack Diablo SurveyOpenstack Diablo Survey
Openstack Diablo Survey
 
Learn OpenStack from trystack.cn ——Folsom in practice
Learn OpenStack from trystack.cn  ——Folsom in practiceLearn OpenStack from trystack.cn  ——Folsom in practice
Learn OpenStack from trystack.cn ——Folsom in practice
 
An Intrudction to OpenStack 2017
An Intrudction to OpenStack 2017An Intrudction to OpenStack 2017
An Intrudction to OpenStack 2017
 
Shmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security BriefShmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security Brief
 
OpenCms Days 2012 - OpenCms on open clouds
OpenCms Days 2012 - OpenCms on open cloudsOpenCms Days 2012 - OpenCms on open clouds
OpenCms Days 2012 - OpenCms on open clouds
 
vBrownBag OpenStack Networking Talk
vBrownBag OpenStack Networking TalkvBrownBag OpenStack Networking Talk
vBrownBag OpenStack Networking Talk
 
Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture
Using Splunk or ELK for Auditing AWS/GCP/Azure Security postureUsing Splunk or ELK for Auditing AWS/GCP/Azure Security posture
Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture
 
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
Using Splunk/ELK for auditing AWS/GCP/Azure security postureUsing Splunk/ELK for auditing AWS/GCP/Azure security posture
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
 
Cloud computing and its job opportunities
Cloud computing and its job opportunities Cloud computing and its job opportunities
Cloud computing and its job opportunities
 
Exploration of eucalyptus_v2.0
Exploration of eucalyptus_v2.0Exploration of eucalyptus_v2.0
Exploration of eucalyptus_v2.0
 
Triangle OpenStack Meetup
Triangle OpenStack MeetupTriangle OpenStack Meetup
Triangle OpenStack Meetup
 
Visão Técnica - RHOS (Red Hat Enterprise Linux OpenStack)
Visão Técnica - RHOS (Red Hat Enterprise Linux OpenStack)Visão Técnica - RHOS (Red Hat Enterprise Linux OpenStack)
Visão Técnica - RHOS (Red Hat Enterprise Linux OpenStack)
 
Cloudian_Cassandra Summit 2012
Cloudian_Cassandra Summit 2012Cloudian_Cassandra Summit 2012
Cloudian_Cassandra Summit 2012
 
OpenStack for VMware Administrators
OpenStack for VMware AdministratorsOpenStack for VMware Administrators
OpenStack for VMware Administrators
 
Cloud and its job oppertunities
Cloud and its job oppertunitiesCloud and its job oppertunities
Cloud and its job oppertunities
 
What is OpenStack and the added value of IBM solutions
What is OpenStack and the added value of IBM solutionsWhat is OpenStack and the added value of IBM solutions
What is OpenStack and the added value of IBM solutions
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

Lund security workshop_presentation

  • 1. How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science
  • 2. 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3. Trusted Computing and TPM 4. Trusted VM launch 5. InfraCloud 6. Future work
  • 3. 3 Infrastructure-as-a-Service • A 'cloud computing' service model (NIST:2011):  Provision processing, storage, networks.  Deploy and run arbitrary software.  No control over underlying cloud infrastructure.  Control over OS, storage, deployed applications.  Limited control of select networking components.
  • 4. 4 Infrastructure-as-a-Service architectural overview OpenStack architectural overview https://wiki.openstack.org/wiki/ArchitecturalOverview
  • 5. 5 Infrastructure-as-a-Service security issues  2011: Vulnerabilities in the AWS management console (XSS and XML wrapping attacks) OpenStack architectural overview https://wiki.openstack.org/wiki/ArchitecturalOverview
  • 6. 6 Infrastructure-as-a-Service security issues  2011: Vulnerabilities in the AWS management console (XSS and XML wrapping attacks)  2012: Cross-VM Side Channels can be used to extract private keys. OpenStack architectural overview https://wiki.openstack.org/wiki/ArchitecturalOverview
  • 7. 7 Infrastructure-as-a-Service security issues  2011: Vulnerabilities in the AWS management console (XSS and XML wrapping attacks)  2012: Cross-VM Side Channels can be used to extract private keys  2012: Rackspace’s “dirty disks” OpenStack architectural overview https://wiki.openstack.org/wiki/ArchitecturalOverview
  • 9. 9 Introducing the TPM  Trusted platform module v1.2 as specified by TCG.  v2.0 is currently under review.  Tamper-evident.  16+ PCRs for volatile storage.  Four operations: Signing / Binding / Sealing / Sealed-sign.
  • 10. 10 Introducing the TPM: output • Produces integrity measurements of the firmware at boot time.  Can produce integrity measurements of the loaded kernel modules (sample below).
  • 11. 11 Introducing the TPM: usage • Microsoft BitLocker • Google Chromium OS • Citrix XenServer • Oracle’s X- and T-Series Systems • HP ProtectTools • Others
  • 12. 12 Securing IaaS environments with trusted computing • Virtualization security. • Storage protection in IaaS environments. • Computing security in IaaS environments. • Remote host software integrity attestation. • Runtime host software integrity attestation. • Encryption key management in IaaS environments.
  • 13. 13 Computing security in IaaS environments: Problem Setting • “Consumer is able to deploy and run arbitrary software, which can include operating systems and applications.”  Client can launch VMs for sensitive computations.  Trusted VM launch – the correct VM is launched in a IaaS platform on a host with a known software stack verified to not have been modified by malicious actors.  IaaS security with trusted computing.  How do we ensure a trusted VM launch in an untrusted IaaS environment?
  • 14. 14 Attack scenario 1 Remote attacker (Ar) Scheduler (S) Ar could schedule the VM instance to be launched on a compromised host Trusted Compute Compute Host Host (CH) (CH) Hardware Hardware Hardware Client (C)
  • 15. 15 Attack scenario 2 Remote attacker (Ar) Scheduler (S) Trusted Compute Compute Compute Host Host Host (CH) (CH) (CH) Ar could compromise the VM image prior to Hardware Hardware Hardware launch Client (C)
  • 16. 16 Trusted VM launch protocol • Ensure VM image launched on a trusted host. • Ensure communication with VM launched on a trusted CH rather than a random VM. • Compute host to verify the integrity VM image to be launched. • Minimum implementation footprint on the IaaS codebase. • Transparent view of the secure launch procedures.
  • 17. Protocol: birds-eye view 3. (S) 1. 4. 5. 2. 6. CH CH CH HW HW HW + Client (C) TPM
  • 18. 18 Prototype implementation • OpenStack cluster deployed on 3 nodes (TPM-equipped) • Code extensions: • Changes OpenStack launch procedure. • Implementation of an OpenStack–TPM communication “glue”. • Implementation of a TTP (interpretation of attestation info) • Implementation of client-side functionality (token generation, trusted launch verification).
  • 19. 19 Securing IaaS with InfraCloud: The project • Ongoing project in collaboration between Region Skåne, Ericsson Research and SICS. • Aim: proof of concept design and deployment of one of the region’s medical journaling systems in a hardened and trustworthy IaaS environment. • Prototype implementation based on earlier research, as well as solutions to newly identified challenges.
  • 20. 20 Securing IaaS with InfraCloud: The challenges Numerous new research challenges have been identified already in the early stages of the project: • Storage protection in untrusted IaaS environments. • Verification and protection of a deployment’s network configuration. • Runtime VM instance protection (prevent memory dumping, cloning). • Secure key handling mechanisms in untrusted IaaS deployments. • Update and patch deployment on guest VM instances. • Interpretation of TPM attestation data.
  • 21. 21 Conclusion • Out-of-the-box public IaaS probably not acceptable for most organizations handling sensitive data. • A comprehensive solution for data protection in public IaaS environments has not been found yet. • SICS Secure Systems lab works with various aspects of guest protection in untrusted IaaS. • Trusted Computing Technologies allow to address some of the issues with IaaS security. • Participation in the InfraCloud project and practical application of protocols reveal multiple new research challenges.