首页> 外文会议>ACM symposium on access control models and technologies >Hardware-enhanced Access Control in Cloud Computing
【24h】

Hardware-enhanced Access Control in Cloud Computing

机译:云计算中的硬件增强的访问控制

获取原文

摘要

Future trustworthy computer systems should provide built-in support for at least the cornerstone security properties of confidentiality, integrity and availability. Access control can help significantly towards achieving this. However, in today's computing landscape, traditional access control implemented only in software may be either insufficient or non-optimal. We discuss some of these situations. Furthermore, fine-grained access control and usage control mechanisms implemented in software are themselves subject to attack, and may impose heavy performance overheads. Can new hardware architecture improve the security achievable by software mechanisms for access control and usage control? If so, what types of hardware support are most useful while retaining the flexibility of software protection mechanisms? What can software do, to help hardware achieve the best results? With the trend towards Cloud Computing, we discuss how new hardware architectural features for cloud servers can help protect the confidentiality and integrity of a cloud customer's code and data in his leased Virtual Machines -- even when the powerful underlying hypervisor may be compromised [1.2]. This uses a new, non-bypassable form of hardware access control. Without requiring new hardware, we can also leverage the hardware trend towards manycore chips, and the already available hardware virtualization features, to enhance Cloud Security but with a few restrictions and some new software support [3.4]. In general, we would like to motivate collaborations between the software security and the hardware architecture communities to explore software-hardware co-design for security [5]. What comes beyond access control in cloud computing and mobile computing ecosystems? The goal is to design future trustworthy systems that provide security protections, at the levels needed, when needed, even with malware in the system.
机译:未来值得信赖的计算机系统应为至少支持机密性,完整性和可用性的基石安全性质提供内置支持。访问控制可以有助于实现这一目标。然而,在当今的计算景观中,仅在软件中实现的传统访问控制可能是不够的或非最佳的。我们讨论了一些这些情况。此外,在软件中实现的细粒度访问控制和使用控制机制本身可能受到攻击,并且可能强加重度性能开销。新硬件架构可以通过软件机制来提高访问控制和使用控制可实现的安全性吗?如果是这样,在保留软件保护机制的灵活性时,最有用的硬件支持类型最有用?软件可以做什么,帮助硬件达到最佳结果?随着云计算的趋势,我们讨论了云服务器的新硬件架构功能如何帮助保护云客户代码和数据中租用的虚拟机中的数据的机密性和完整性 - 即使当强大的底层管理程序可能会受到损害[1.2] 。这采用了一种新的不绕过的硬件访问控制形式。如果不需要新的硬件,我们也可以利用硬件趋势对多核芯片,以及已有的硬件虚拟化功能,增强云安全,但有一些限制和一些新的软件支持[3.4]。一般来说,我们想激励软件安全和硬件架构社区之间的合作,以探索安全性 - 硬件共同设计[5]。云计算和移动计算生态系统中的访问控制是什么?目标是设计未来值得信赖的系统,即使在系统中的恶意软件也需要在所需的级别提供安全保护。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号