TY - GEN
T1 - RunTest
T2 - 5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010
AU - Du, Juan
AU - Wei, Wei
AU - Gu, Xiaohui
AU - Yu, Ting
PY - 2010
Y1 - 2010
N2 - Cloud computing has emerged as a multi-tenant resource sharing platform, which allows different service providers to deliver software as services in an economical way. However, for many security sensitive applications such as critical data processing, we must provide necessary security protection for migrating those critical application services into shared open cloud infrastructures. In this paper, we present RunTest, a scalable runtime integrity attestation framework to assure the integrity of dataflow processing in cloud infrastructures. RunTest provides light-weight application-level attestation methods to dynamically verify the integrity of data processing results and pinpoint malicious service providers when inconsistent results are detected. We have implemented RunTest within IBM System S dataflow processing system and tested it on NCSU virtual computing lab. Our experimental results show that our scheme is effective and imposes low performance impact for dataflow processing in the cloud infrastructure.
AB - Cloud computing has emerged as a multi-tenant resource sharing platform, which allows different service providers to deliver software as services in an economical way. However, for many security sensitive applications such as critical data processing, we must provide necessary security protection for migrating those critical application services into shared open cloud infrastructures. In this paper, we present RunTest, a scalable runtime integrity attestation framework to assure the integrity of dataflow processing in cloud infrastructures. RunTest provides light-weight application-level attestation methods to dynamically verify the integrity of data processing results and pinpoint malicious service providers when inconsistent results are detected. We have implemented RunTest within IBM System S dataflow processing system and tested it on NCSU virtual computing lab. Our experimental results show that our scheme is effective and imposes low performance impact for dataflow processing in the cloud infrastructure.
KW - cloud computing
KW - secure dataflow processing
KW - service integrity attestation
UR - http://www.scopus.com/inward/record.url?scp=77954472711&partnerID=8YFLogxK
U2 - 10.1145/1755688.1755724
DO - 10.1145/1755688.1755724
M3 - Conference contribution
AN - SCOPUS:77954472711
SN - 9781605589367
T3 - Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
SP - 293
EP - 304
BT - Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
Y2 - 13 April 2010 through 16 April 2010
ER -