SlideShare a Scribd company logo
Trust and Cloud computing,
removing the need for the
consumer to trust their
provider
Prof David Wallom
University of Oxford
Overview
• The problem
– Drivers of cloud adoption
– Threats forming barriers to adoption
– Trust and the stakeholders in the cloud
– Building trust through regulation
– Trusted products within a marketplace
• The solution
– Trusted Computing
– Chain of trust
– OAT
– Trusted Appliances, Applications and user data
Problem…
Trust and Cloud computing, removing the need for the consumer to trust their provider
Trust and Cloud computing, removing the need for the consumer to trust their provider
7 Cloud Computing security risks
Trust at the Last Mile
• Problem for high value instantly usable data and services
– Critical data or keys are still exposed inside the cloud at the final steps
– Still require customers unconditional trust of their CSP
– Value may be great enough that traditional blackmail/bribery may be enough
to gain access
Cloud (IaaS) and Security
cloud infrastructure
Storage
(Object)
Storage
(Block)
Host
VM
Host
VM
…
Users
• AAI: management, storage APIs.
• VMs: security groups (layer 2/3), firewall,
VPN.
• OS: admin policies, monitoring, auditing,
patches, etc.
• HW: physical security
• How can users trust the origin and identity
of the cloud infrastructure software stack?
• How can users trust the origin and identity
of VMs, Block Storage, Storage Objects?
“What is really going on
inside the cloud?”
New Industries Around Security and Trust
Building trust through regulation
Building trust by building brands
Recap
• Cloud already affects all our lives, it will soon affect extremely high value parts of our lives even more
• Security, Trust and Privacy still great concerns
• The very thing that makes cloud great (of not caring about the innards) also causes some of our headaches
• Regulation may be well meaning when introduced but ultimately doesn’t improve the user experience as it
by def. limits some functions or capabilities
• Providing improved consumer information may allow us to build reputation systems but there is nothing to
stop them being subverted and having to use clean branded appliances each time will cause operational
headaches.
• We must trust our cloud provider, completely!
• We don’t really know whats going on within the cloud
• We are worried we may lose our data
A solution
Trusted Computing
• What it is: A set of specifications proposed by the Trusted Computing Group (TCG) for
implementing a remotely verifiable infrastructure.
• What it does and what it does not: It enables a challenger to remotely verify the genuine
configurations of a platform. It provides no guarantee on the security properties of the platform,
but leaves the challengers to determine the properties by mapping the configurations to a
predefined security properties repository.
• TPM: A cost-effective secure hardware, providing tamper-proof capabilities for storing and
reporting the platform’s configuration, together with other supporting capabilities, such as
secure key management.
• Integrity and attestation: The integrity of a platform is defined as its capability to behave as
expected. In general implementation, integrity is interpreted as whether only expected software
components with expected configurations have been loaded on the target platform. Remote
Attestations are performed to examine the integrity of a remote platform.
• Strengths and limitations: Trust Computing mechanisms are built upon the tamper-proof
hardware. However, complexities in managing the expected platform configurations have
inhibited the widespread adoption of Trusted Computing.
Extend the Trusted Platform to the cloud
• Reassure customers that the cloud infrastructure is strong
enough to defend against attackers or malicious users.
• Enables a mechanism by which the properties of the cloud
service components and third-party extensions can be
continuously inspected and examined.
Trusted Computing and Cloud Computing
User verifiable Chain of Trust
=
Attestation result of Storage +
Attestation result of Host +
Attestation result of VM
…but in the cloud the hardware
components can change…
HW/TPM
Host Controller
Hypervisor
Virtual
Machine
vTPM
Virtual
Machine
vTPM
Virtual
Machine
vTPM
HW/TPM
Storage
Controller
Storage Service
12
3
123
Open Attestation (OAT) as a Trusted Third
Party
…but what
about resilience
and scalability?
Porridge (Distributed OAT)
• High frequency platform verification
• Application whitelisting
• Verifiable Logging
Implementation in Openstack
Attesting Cloud Services
• VM attestation
– Know exactly the status of your system, its how you left it!
• Centralized Attestation Service
– A service to periodically examining all the cloud nodes and recording their configurations;
– Customers attest the delegates to make sure the attestation service is correctly running.
– Supporting dynamic VM migration attesting both source and destination to ensure continual
validity
• Property-based Access Controls
– Customers define the access control policies to their data or keys based on the properties of
the accessing cloud applications and the underlying hosting infrastructure.
– Whitelisting application software within a cloud instance
Trusted Data Processing
• To ensure that customer data is not abused by their CSP
when outsourced to the cloud infrastructure for processing
or storage.
• TDP ensures customers that their data is only decrypted by
their applications, having the predefined states, and being
deployed on the part of the cloud satisfying predefined SLA.
Trusted Data Exchanging
• To ensure that Customer Data is not abused by other
customers when shared on a common infrastructure to
achieve cooperative computations.
• TDP ensures a Data Provider that every piece of data is
processed only by applications with predetermined
properties.
Conclusion
• Trust is still highlighted as a significant barrier to cloud adoption in high value usecases
• Traditional security still requires users to trust their CSP
• Regulation may aim for a secure business as usual, it doesn’t support you when things go
wrong
• Utilising Trusted Computing and remote attestation builds a chain of trust
– Hardware -> Cloud Host -> Hypervisor -> VM -> application software + Data
– Support application and data whitelisting to ensure only those with permission can use services
or capabilities
• Only registered and verified hosts can run high value applications
• Only registered and verifies services can access high value data
• Extending existing Trusted Third Party capabilities to support multiple trusted Service
Providers providing externally verifiable measurement of cloud located services
• We are removing the need to trust your cloud provider by building cryptographically
secure cloud
Thank You!

More Related Content

PPTX
Trust and Cloud computing, removing the need for the consumer to trust their ...
PDF
E magic case study
PPTX
Ame 2269 ibm mq high availability
PPTX
3433 IBM messaging security why securing your environment is important-feb2...
PPT
IBM Integration Bus & WebSphere MQ - High Availability & Disaster Recovery
PPTX
VMworld 2015: The Best SDDC!
PPT
Health monitoring and alerting for xen app, xendesktop and netscaler
PDF
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
Trust and Cloud computing, removing the need for the consumer to trust their ...
E magic case study
Ame 2269 ibm mq high availability
3433 IBM messaging security why securing your environment is important-feb2...
IBM Integration Bus & WebSphere MQ - High Availability & Disaster Recovery
VMworld 2015: The Best SDDC!
Health monitoring and alerting for xen app, xendesktop and netscaler
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief

What's hot (20)

PDF
move-anti-virus
PPTX
CompTIA Security Plus Overview
PPTX
6421 b Module-07
PPT
Performance testing virtualized systems v5
PPSX
VMware: my jsme “software defined”
PDF
Encoding Enhancers Woolpack virtualization services
PPTX
[DSBW Spring 2009] Unit 05: Web Architectures
PPTX
Network access protection ppt
PPTX
Understanding mq deployment choices and use cases
PPTX
Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...
PDF
Expanding your options with the MQ Appliance
PPT
Why Security Teams should care about VMware
PPSX
Flex Cloud Hosting - Reduce server sprawl and optimize server utilization
PDF
Stratus Fault-Tolerant Cloud Infrastructure Software for NFV using OpenStack
PPTX
Aruba Rightsizing Your Network
PPT
Virtualization 2.0
PPT
Session #107 - AMSI Hosting Options
PPTX
Cloud Computing and Data Centers
PDF
Troubleshooting and debugging Citrix Receiver for iOS and Android
PPT
Cross selling 5
move-anti-virus
CompTIA Security Plus Overview
6421 b Module-07
Performance testing virtualized systems v5
VMware: my jsme “software defined”
Encoding Enhancers Woolpack virtualization services
[DSBW Spring 2009] Unit 05: Web Architectures
Network access protection ppt
Understanding mq deployment choices and use cases
Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...
Expanding your options with the MQ Appliance
Why Security Teams should care about VMware
Flex Cloud Hosting - Reduce server sprawl and optimize server utilization
Stratus Fault-Tolerant Cloud Infrastructure Software for NFV using OpenStack
Aruba Rightsizing Your Network
Virtualization 2.0
Session #107 - AMSI Hosting Options
Cloud Computing and Data Centers
Troubleshooting and debugging Citrix Receiver for iOS and Android
Cross selling 5
Ad

Similar to Trust and Cloud computing, removing the need for the consumer to trust their provider (20)

PPTX
Trust and Cloud Computing, removing the need to trust your cloud provider
PPT
Security Issues of Cloud Computing
PDF
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
PDF
Software Defined Networking in the ATMOSPHERE project
PPTX
Acceleration_and_Security_draft_v2
PDF
Lecture27 cc-security2
PPTX
Cloud Cmputing Security
PDF
Cloud Security
PDF
Privacy preserving public auditing for secure cloud storage
PDF
cACCESS_ZTNA PRODUCT CATALOGUE IN THE FILE.pdf
PPTX
ARCHITECTURAL_DESIGN_OF_COMPUTE_AND_STORAGE_CLOUDS[1] - Read-Only.pptx
PDF
Is it an internal affair
PPT
Cloud computing-2 (1)
PPTX
Myths of validation
PDF
Client Server Network Security
PDF
Unit 1.2 move to cloud computing
PPTX
Gary Homeland Security Presentation 102114
PDF
Cloud Security
PPTX
Transforming cloud security into an advantage
PPTX
Zero trust model for cloud computing.pptx
Trust and Cloud Computing, removing the need to trust your cloud provider
Security Issues of Cloud Computing
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Software Defined Networking in the ATMOSPHERE project
Acceleration_and_Security_draft_v2
Lecture27 cc-security2
Cloud Cmputing Security
Cloud Security
Privacy preserving public auditing for secure cloud storage
cACCESS_ZTNA PRODUCT CATALOGUE IN THE FILE.pdf
ARCHITECTURAL_DESIGN_OF_COMPUTE_AND_STORAGE_CLOUDS[1] - Read-Only.pptx
Is it an internal affair
Cloud computing-2 (1)
Myths of validation
Client Server Network Security
Unit 1.2 move to cloud computing
Gary Homeland Security Presentation 102114
Cloud Security
Transforming cloud security into an advantage
Zero trust model for cloud computing.pptx
Ad

More from David Wallom (20)

PPTX
Quantifying the impact of green leasing on energy use in a retail portfolio: ...
PPTX
The University of Oxford e-Research Centre
PPTX
Introduction to Cloud Computing
PPTX
Benefits of big data analytics in Smart Metering, ADEPT, WICKED and beyond
PPTX
Smarter Energy, Infrastruture service, consumtion analytics and applications
PPTX
The Climateprediction.net programme, big data climate modelling
PPTX
1990-2050 sulphur dioxide emissions data from ECLIPSE v5a for use in Met Offi...
PPTX
Supporting Research through "Desktop as a Service" models of e-infrastructure...
PPTX
e-Research & the art of linking Astrophysics to Deforestation
PPTX
Privacy and Security policies in the cloud
PPTX
Working with Earth Observation Data, INFORM and the IEA
PPTX
WICKED - Working with the data rich
PPTX
Mapping Priorities and Future Collaborations for you Projects
PPTX
CloudWatch: Mapping priorities and future collaboration for your project
PPTX
CloudWatch2 Adoption Deep Dive
PPTX
e-infrastructural needs to support informatics
PPTX
Generating Insight from Big Data
PPTX
International Forest Risk Model
PPTX
Generating Insight from Big Data in Energy and the Environment
PPTX
Smart Grid, Smart Metering and Cybersecurity
Quantifying the impact of green leasing on energy use in a retail portfolio: ...
The University of Oxford e-Research Centre
Introduction to Cloud Computing
Benefits of big data analytics in Smart Metering, ADEPT, WICKED and beyond
Smarter Energy, Infrastruture service, consumtion analytics and applications
The Climateprediction.net programme, big data climate modelling
1990-2050 sulphur dioxide emissions data from ECLIPSE v5a for use in Met Offi...
Supporting Research through "Desktop as a Service" models of e-infrastructure...
e-Research & the art of linking Astrophysics to Deforestation
Privacy and Security policies in the cloud
Working with Earth Observation Data, INFORM and the IEA
WICKED - Working with the data rich
Mapping Priorities and Future Collaborations for you Projects
CloudWatch: Mapping priorities and future collaboration for your project
CloudWatch2 Adoption Deep Dive
e-infrastructural needs to support informatics
Generating Insight from Big Data
International Forest Risk Model
Generating Insight from Big Data in Energy and the Environment
Smart Grid, Smart Metering and Cybersecurity

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Big Data Technologies - Introduction.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Electronic commerce courselecture one. Pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation theory and applications.pdf
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Modernizing your data center with Dell and AMD
PDF
Machine learning based COVID-19 study performance prediction
PPTX
A Presentation on Artificial Intelligence
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Advanced methodologies resolving dimensionality complications for autism neur...
Big Data Technologies - Introduction.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Review of recent advances in non-invasive hemoglobin estimation
Electronic commerce courselecture one. Pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
The AUB Centre for AI in Media Proposal.docx
Encapsulation theory and applications.pdf
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Monthly Chronicles - July 2025
Modernizing your data center with Dell and AMD
Machine learning based COVID-19 study performance prediction
A Presentation on Artificial Intelligence
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Network Security Unit 5.pdf for BCA BBA.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Trust and Cloud computing, removing the need for the consumer to trust their provider

  • 1. Trust and Cloud computing, removing the need for the consumer to trust their provider Prof David Wallom University of Oxford
  • 2. Overview • The problem – Drivers of cloud adoption – Threats forming barriers to adoption – Trust and the stakeholders in the cloud – Building trust through regulation – Trusted products within a marketplace • The solution – Trusted Computing – Chain of trust – OAT – Trusted Appliances, Applications and user data
  • 6. 7 Cloud Computing security risks
  • 7. Trust at the Last Mile • Problem for high value instantly usable data and services – Critical data or keys are still exposed inside the cloud at the final steps – Still require customers unconditional trust of their CSP – Value may be great enough that traditional blackmail/bribery may be enough to gain access
  • 8. Cloud (IaaS) and Security cloud infrastructure Storage (Object) Storage (Block) Host VM Host VM … Users • AAI: management, storage APIs. • VMs: security groups (layer 2/3), firewall, VPN. • OS: admin policies, monitoring, auditing, patches, etc. • HW: physical security • How can users trust the origin and identity of the cloud infrastructure software stack? • How can users trust the origin and identity of VMs, Block Storage, Storage Objects?
  • 9. “What is really going on inside the cloud?”
  • 10. New Industries Around Security and Trust
  • 12. Building trust by building brands
  • 13. Recap • Cloud already affects all our lives, it will soon affect extremely high value parts of our lives even more • Security, Trust and Privacy still great concerns • The very thing that makes cloud great (of not caring about the innards) also causes some of our headaches • Regulation may be well meaning when introduced but ultimately doesn’t improve the user experience as it by def. limits some functions or capabilities • Providing improved consumer information may allow us to build reputation systems but there is nothing to stop them being subverted and having to use clean branded appliances each time will cause operational headaches. • We must trust our cloud provider, completely! • We don’t really know whats going on within the cloud • We are worried we may lose our data
  • 15. Trusted Computing • What it is: A set of specifications proposed by the Trusted Computing Group (TCG) for implementing a remotely verifiable infrastructure. • What it does and what it does not: It enables a challenger to remotely verify the genuine configurations of a platform. It provides no guarantee on the security properties of the platform, but leaves the challengers to determine the properties by mapping the configurations to a predefined security properties repository. • TPM: A cost-effective secure hardware, providing tamper-proof capabilities for storing and reporting the platform’s configuration, together with other supporting capabilities, such as secure key management. • Integrity and attestation: The integrity of a platform is defined as its capability to behave as expected. In general implementation, integrity is interpreted as whether only expected software components with expected configurations have been loaded on the target platform. Remote Attestations are performed to examine the integrity of a remote platform. • Strengths and limitations: Trust Computing mechanisms are built upon the tamper-proof hardware. However, complexities in managing the expected platform configurations have inhibited the widespread adoption of Trusted Computing.
  • 16. Extend the Trusted Platform to the cloud • Reassure customers that the cloud infrastructure is strong enough to defend against attackers or malicious users. • Enables a mechanism by which the properties of the cloud service components and third-party extensions can be continuously inspected and examined.
  • 17. Trusted Computing and Cloud Computing User verifiable Chain of Trust = Attestation result of Storage + Attestation result of Host + Attestation result of VM …but in the cloud the hardware components can change… HW/TPM Host Controller Hypervisor Virtual Machine vTPM Virtual Machine vTPM Virtual Machine vTPM HW/TPM Storage Controller Storage Service 12 3 123
  • 18. Open Attestation (OAT) as a Trusted Third Party …but what about resilience and scalability?
  • 19. Porridge (Distributed OAT) • High frequency platform verification • Application whitelisting • Verifiable Logging
  • 21. Attesting Cloud Services • VM attestation – Know exactly the status of your system, its how you left it! • Centralized Attestation Service – A service to periodically examining all the cloud nodes and recording their configurations; – Customers attest the delegates to make sure the attestation service is correctly running. – Supporting dynamic VM migration attesting both source and destination to ensure continual validity • Property-based Access Controls – Customers define the access control policies to their data or keys based on the properties of the accessing cloud applications and the underlying hosting infrastructure. – Whitelisting application software within a cloud instance
  • 22. Trusted Data Processing • To ensure that customer data is not abused by their CSP when outsourced to the cloud infrastructure for processing or storage. • TDP ensures customers that their data is only decrypted by their applications, having the predefined states, and being deployed on the part of the cloud satisfying predefined SLA.
  • 23. Trusted Data Exchanging • To ensure that Customer Data is not abused by other customers when shared on a common infrastructure to achieve cooperative computations. • TDP ensures a Data Provider that every piece of data is processed only by applications with predetermined properties.
  • 24. Conclusion • Trust is still highlighted as a significant barrier to cloud adoption in high value usecases • Traditional security still requires users to trust their CSP • Regulation may aim for a secure business as usual, it doesn’t support you when things go wrong • Utilising Trusted Computing and remote attestation builds a chain of trust – Hardware -> Cloud Host -> Hypervisor -> VM -> application software + Data – Support application and data whitelisting to ensure only those with permission can use services or capabilities • Only registered and verified hosts can run high value applications • Only registered and verifies services can access high value data • Extending existing Trusted Third Party capabilities to support multiple trusted Service Providers providing externally verifiable measurement of cloud located services • We are removing the need to trust your cloud provider by building cryptographically secure cloud

Editor's Notes

  • #10: How to effectively verify “what is really going on inside the cloud”. Whether the acquired Cloud services are enforced; Whether only the acquired Cloud services are accessing customers’ data.
  • #11: The tripadvisor methodology
  • #16: 15
  • #18: Attestation of VMs: only expected programs with expected configuration files are loaded inside the VM. Attestation of Hosts: only the expected VM with the expected software stack has been instantiated. The VM the user is currently connecting to, is genuinely loaded by the genuine hypervisor. Attestation of Storage: the VM is binding to the expected virtual storage, and the state of the virtual storage can only be manipulated by an expected software stack. The virtual storage connected to the user’s VM is genuinely loaded and managed by the genuine Storage Management software with the specified parameters.
  • #19: Intels