Browse by author
Lookup NU author(s): Dr Dev JhaORCiD
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
© 2022 Owner/Author. Applications executing in the cloud are prone to numerous attacks including network, malware and data manipulation which are not immediately apparent. The Dwell Time for an attack to be noticed is currently 211 days where human error is reported to be a factor of 95% of data breaches [1]. In this abstract, we present TrustedCloud, a novel framework for run-time trust state analysis of a virtual machine (VM). TrustedCloud has four components, a) Trust Agent, b) Kernel Module and c) Trusted Platform Module (TPM) executing in all the VMs while d) Verification Cluster, a centralised entity verifying the VM's state. We will show the functioning of the TrustedCloud from the stage of VM creation to the detection of unauthorised service execution.
Author(s): Jha DN, Lenton G, Asker J, Blundell D, Wallom D
Publication type: Conference Proceedings (inc. Abstract)
Publication status: Published
Conference Name: 23rd International Middleware Conference Demos and Posters (Middleware 2022)
Year of Conference: 2022
Pages: 17-18
Online publication date: 22/11/2022
Acceptance date: 02/04/2018
Publisher: ACM
URL: https://doi.org/10.1145/3565386.3565492
DOI: 10.1145/3565386.3565492
Library holdings: Search Newcastle University Library for this item
ISBN: 9781450399319