TRIGLAV: Remote Attestation of the Virtual Machine's Runtime Integrity in Public Clouds | IEEE Conference Publication | IEEE Xplore

TRIGLAV: Remote Attestation of the Virtual Machine's Runtime Integrity in Public Clouds


Abstract:

Trust is of paramount concern for tenants to deploy their security-sensitive services in the cloud. The integrity of virtual machines (VMs) in which these services are de...Show More

Abstract:

Trust is of paramount concern for tenants to deploy their security-sensitive services in the cloud. The integrity of virtual machines (VMs) in which these services are deployed needs to be ensured even in the presence of powerful adversaries with administrative access to the cloud. Traditional approaches for solving this challenge leverage trusted computing techniques, e.g., vTPM, or hardware CPU extensions, e.g., AMD SEV. But, they are vulnerable to powerful adversaries, or they provide only load time (not runtime) integrity measurements of VMs. We propose TRIGLAV, a protocol allowing tenants to establish and maintain trust in VM runtime integrity of software and its configuration. TRIGLAV is transparent to the VM configuration and setup. It performs an implicit attestation of VMs during a secure login and binds the VM integrity state with the secure connection. Our prototype's evaluation shows that TRIGLAV is practical and incurs low performance overhead (< 6%).
Date of Conference: 05-10 September 2021
Date Added to IEEE Xplore: 08 November 2021
ISBN Information:

ISSN Information:

Conference Location: Chicago, IL, USA

I. Introduction

Cloud computing paradigm shifts the responsibility of the computing resources management from application owners to cloud providers, allowing application owners (tenants) to focus on their business use cases instead of on hardware management and administration. However, trust is of paramount concern for tenants operating security-sensitive systems because software managing computing resources and its configuration and administration remains out of their control. Tenants have to trust that the cloud provider, its employees, and the infrastructure protect the tenant's intellectual property as well as the confidentiality and the integrity of the tenant's data. A malicious employee [1], or an adversary who gets into possession of employee credentials [2], [3], might leverage administrator privileges to read the confidential data by introspecting virtual machine (VM) memory [4], to tamper with computation by subverting the hypervisor [5], or to redirect the tenant to an arbitrary VM under her control by altering a network configuration [6]. We tackle the problem of how to establish trust in a VM executed in the cloud. Specifically, we focus on the integrity of legacy systems executed in a VM.

Contact IEEE to Subscribe

References

References is not available for this document.