Providing User Security Guarantees in Public Infrastructure Clouds
- Submitting institution
-
The University of Westminster
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 9v7z7
- Type
- D - Journal article
- DOI
-
10.1109/TCC.2016.2525991
- Title of journal
- IEEE Transactions on Cloud Computing
- Article number
- -
- First page
- 405
- Volume
- 5
- Issue
- 3
- ISSN
- 2168-7161
- Open access status
- Compliant
- Month of publication
- February
- Year of publication
- 2016
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
2
- Research group(s)
-
-
- Citation count
- 28
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- This work presents a list of security protocols that allow trust to be established by verifying the trustworthiness of a Cloud Service Provider by remotely attesting a host platform configuration. Apart from the research contribution of the work, its importance is evident from a high number of research projects (e.g. https://digitbrain.eu/, https://www.asclepios-project.eu/) that have been funded and using a protocol for trusted launch. Furthermore, big industrial players such as Ericsson, Apple and Microsoft are using similar protocols (e.g. secure boot). Finally, the company Consenses (https://consenses.de/en/home contact: J.Stahlmann stahlmann@consenses.de) are planning to add a version of our protocol in their services.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -