Trust is of paramount concern for tenants to deploy their security-sensitive
services in the cloud. The integrity of VMs in which these services are
deployed needs to be ensured even in the presence of powerful adversaries with
administrative access to the cloud. Traditional approaches for solving this
challenge leverage trusted computing techniques, e.g., vTPM, or hardware CPU
extensions, e.g., AMD SEV. But, they are vulnerable to powerful adversaries, or
they provide only load time (not runtime) integrity measurements of VMs.

360 Mobile Vision - 360mobilevision.com North & South Carolina Security products and Systems Installations for Commercial and Residential - $55 Hourly Rate. ACCESS CONTROL, INTRUSION ALARM, ACCESS CONTROLLED GATES, INTERCOMS AND CCTV INSTALL OR REPAIR 360 Mobile Vision - 360mobilevision.com is committed to excellence in every aspect of our business. We uphold a standard of integrity bound by fairness, honesty and personal responsibility. Our distinction is the quality of service we bring to our customers. Accurate knowledge of our trade combined with ability is what makes us true professionals. Above all, we are watchful of our customers interests, and make their concerns the basis of our business.

We propose WELES, a protocol allowing tenants to establish and maintain trust
in VM runtime integrity of software and its configuration. WELES is transparent
to the VM configuration and setup. It performs an implicit attestation of VMs
during a secure login and binds the VM integrity state with the secure
connection. Our prototype’s evaluation shows that WELES is practical and incurs
low performance overhead.

By admin