Supplemental Material: Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
نویسندگان
چکیده
Proof: We can prove Proposition 1 by contradiction. Suppose the number of malicious service providers is less than |CG|. Then the graph formed by malicious nodes cannot cover the entire graph, which means there exists one edge that is not incident to any of the malicious nodes. Thus, the edge must be incident to two benign nodes. Since two benign nodes always agree with each other, this contradicts with the existence of an inconsistency link between them.
منابع مشابه
Trustworthy services through attestation
Remote attestation is a promising mechanism for assurance of distributed systems. It allows users to identify the software running on a remote system before trusting it with an important task. This functionality is arriving at exactly the right time as security-critical systems, such as healthcare and financial services, are increasingly being hosted online. However, attestation has limitations...
متن کاملIntel SGX Enabled Key Manager Service with OpenStack Barbican
Protecting data in the cloud continues to gain in importance, with encryption being used to achieve the desired data protection. While there is desire to use encryption, various cloud components do not want to deal with key management, which points to a strong need for a separate key management system. OpenStack Barbican is a platform developed by the OpenStack community aimed at providing cryp...
متن کاملMaat: A Platform Service for Measurement and Attestation
Software integrity measurement and attestation (M&A) are critical technologies for evaluating the trustworthiness of software platforms. To best support these technologies, next generation systems must provide a centralized service for securely selecting, collecting, and evaluating integrity measurements. Centralization of M&A avoids duplication, minimizes security risks to the system, and ensu...
متن کاملA Business Model for Cloud-Based Autonomous Logistics
Cloud computing denotes a paradigm shift in computing that enables a flexible allocation of hardware and software resources on demand. Therewith, it is particularly appealing for applications with a high degree of computational complexity and dynamics. This paper identifies logistics planning and control as a promising application for clouds. However, two prerequisites must be met for cloud-bas...
متن کاملTowards Fourth-party Logistics Providers - A Business Model for Cloud-based Autonomous Logistics
Cloud computing denotes a paradigm shift in computing that enables a flexible allocation of hardware and software resources on demand. Therewith, it is particularly appealing for applications with a high degree of computational complexity and dynamics. This paper identifies logistics planning and control as a promising application for clouds. However, two prerequisites must be met for cloud-bas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013