Trusted Cloud Computing
Trusted Cloud Computing
2 : 2012
ISSN: 1991-8941
Abstract: Cloud computing is a new consumption and delivery model for IT services. The cloud has
become an attractive platform for enterprises to deploy and execute their business services for business to
business (B2B) and government to government (G2G) collaborations, etc. There are many concerns about
cloud computing especially in terms of security, privacy and trust. These main issues have prevented
businesses from fully accepting cloud platforms. Cloud computing demands three primary security
requirements: confidentiality, integrity, and availability. In this paper we discuss some these issues by
reviewing a recently proposed model [1] that interestingly handles secure messaging among services
deployed within the same cloud or on different clouds. Then, we report on our ongoing work which is
based on enhancing and developing this model. This is mainly achieved by adding a new service layer
which is responsible for offering a high level of trust between collaborative parties. The added layer
facilitates the integration of this model with the Public-Key Infrastructure (PKI). The main objective of the
developed model is to increase the trust of the whole system by preventing any unauthorized party from
joining the connectivity service. Indeed, our system can prevent any involved organization from launching
masquerade attacks.
together through local networks to share computing in different way. However, generally
resources and increase performance. In phase 4, we can define cloud computing as a technology
local networks were connected to other local that uses the internet and central remote servers
networks forming a global network such as the to maintain data and applications. Cloud
Internet to utilize remote applications and computing allows consumers and businesses to
resources. In phase 5, grid computing provided use applications without installation and access
shared computing power and storage through a their personal files at any computer with internet
distributed computing system. In phase 6, cloud access.
computing further provides shared resources on According to the U.S. National Institute
the Internet in a scalable and simple way. of Standards and Technology (NIST), cloud
Comparing these six computing computing can also be defined as "a model for
paradigms, it looks like that cloud computing is a enabling convenient, on-demand network access
return to the original mainframe computing to a shared pool of configurable computing
paradigm. However, these two paradigms have resources (e.g., networks, servers, storage,
several important differences. The most applications, and services) that can be rapidly
important difference is that mainframe provisioned and released with minimal
computing offers finite computing power, while management effort or service provider
cloud computing provides almost infinite power interaction". [6]
and capacity. In addition, in mainframe
computing dummy terminals acted as user
interface devices, while in cloud computing
powerful PCs can provide local computing
power and cashing support [4].
Cloud Computing represents one of the
most significant shifts in information technology
that are likely to see fast growth. A Cloud can be
viewed as a type of parallel and distributed
system consisting of a collection of
interconnected and virtualized computers that are
dynamically provisioned and presented as one or
more unified computing resources. Figure1. Computing paradigm shift over six
This work aims to effectively integrate distinct phases [5]
the Public-Key Infrastructure (PKI) with a
recently proposed (by Chen et al [1]) promising B. Characteristics of cloud computing
model of cloud computing in order to solve some There are many characteristics in cloud
of its important security concerns, and hence also computing. Some of the most important of them
to offer a high level of trust within this paradigm. are listed below [7].
This paper can be considered as a work-in- On-demand: Cloud computing provider
progress report on our work in this field. The must be able to deliver computing resources
remaining of this paper is organized as follows: whenever the customer needs them. It is
Section 2 overviews some general concepts of usually assumed that cloud contains infinite
cloud computing. Section 3 briefly discusses storage capacity for any software available
security and trust concerns of cloud computing. in market. The available computing
Then, the original Chen et al architecture is resources in cloud are nearly infinite (i.e.,
introduced in Section 4. In Section 5, some the customer is not limited to the set of
aspects of PKI and digital certificates are servers located at one site and it is the
explained. Next, our proposed architecture for responsibility of the cloud computing
trusted e-contract based cloud computing is provider to have sufficient resources to
described in Section 6. Finally, Section 7 satisfy the requirements of all their
concludes the paper. customers).
Pay-per-use: Another new aspect of cloud
Cloud Computing Overview computing is application of a usage based
A. Definition billing model. The customer pays only for
There is not yet a consensus for what use of processors or storage. That means
exactly the term "cloud computing" means; the consumer does not need to large
where everyone in the IT field defines cloud investment, license or paying software, etc.,
J. of university of anbar for pure science : Vol.6:NO.2 : 2012
subscription for a more generalized framework). scalable tools for key management problems.
However, this system might suffer from serious The main problem in a symmetric key
attacks, when unreal (or unauthorized) cryptosystem is its key-management problem
organization attaches itself and threaten the where the same key is used to encrypt and
whole system security. This case can decrease decrypt the message. This secret key system has
the trust value among the real organization. the significant flaw that if the key is discovered
Therefore, in this work, we are developing or intercepted by someone else, messages can
and enhancing the mentioned model by easily be decrypted .Therefore the public key
effectively integrating it with PKI. This can be cryptosystems are presented as a solution to this
considered as adding a new layer for trust which problem with its dual-key system. In a public
is responsible for detecting unreal organizations. key cryptosystem, private keys are kept secret by
Moreover, our enhancement will contribute to their owners, while the corresponding public
trust from other complimentary direction via keys are stored in a public repository with the
preventing authorized or collaborated names of their owners [14].
organization from launching masquerading PKI is the set of hardware, software, people,
attacks through the proper management of PKI policies and procedures needed to create,
certificates. manage, store, distribute, and revoke public key
There is now a wide acceptance among certificates based on public key cryptography”
security experts to use cryptographic signatures [13]. The basic components of PKI certification
based on PKI. This can be considered as the system are [14], [15], [16]:
most secure and reliable method of signing e-
contracts online. The X.509 is a widely accepted 1. End-entities: End-entities in a PKI can be
standard for developing PKI-based human beings, devices or even software
authentication services. According to this programs. The cryptographic operations
standard, after the certificate is generated, the (encryption, decryption and digital signature)
requirement of transmission needs the format of are performed by the end-entities. In general,
certificate to be changed into Abstract Syntax the end-user may request certificates from a
Notation One (ASN.1) binary file, which is a certification authority (CA), receive the
standard to be exchanged between certificate from the CA, and then use the
communicating application programs [12]. More certified keys and certificates in PKI enabled
details about PKI certificates are in the following application services.
section. 2. Certification Authority (CA): It is also named
trusted third party (TTP). CA is an entity in
PKI AND DIGITAL CERTIFICATES PKI, which is responsible for issuing and
PKI enables users of a basically unsecure manage certificates for the other entities in
public network such as the Internet to securely the system and also checks with registration
and privately exchange data and money. This is authority (RA) to verify the requestor’s
basically done through the use of a public and a information. In the context of a PKI,
private cryptographic key pair that is obtained certification is the act of binding the identity
and shared through a trusted authority. PKI with a public key. This binding occurs in the
provides for a digital certificate that can identify form of a signed data structure referred as a
an individual or an organization. It also provides certificate.
directory services that can store and, when 3. Registration Authorities (RA): RA is a
necessary, revoke the certificates. PKI assumes component that is responsible to verify the
the use of public key cryptography, which is the identity of end-entities .It is possible to
most common method on the Internet for implement the necessary registration
authenticating a message sender and checking functions by a CA, but many PKI
the integrity of a message [13]. implementations separate the operations
Public key cryptography with its dual key performed by the CA and the RA to avoid the
system (public and private keys) seems to best complexity of tasks.
solve the integrity, authentication, and non- 4. Digital Certificates: It is an electronic
repudiation requirements of open networks. It is document which uses a digital signature to
more suitable when compared with the classic bind a public key with identity information
cryptographic methods. It gained more such as the name of a person or an
popularity in the Internet world because of its organization, their address, and so forth. The
certificate can be used to verify that a public
J. of university of anbar for pure science : Vol.6:NO.2 : 2012
Step1: Client (organization) sends identity to Figure 6. The basic interaction steps between
RA. entities for authentication service
Step2: RA checks client identity and other
information using a set of roles stored in RA. Before integrating the main two parts of the
Step3: RA sends positive acknowledgment (if proposed system (i.e. the connectivity service
everything is OK) and the required key to and the authentication service layers), we are
CA. working in parallel also to complete the basic
Step4: CA sends the key and certificate to the engine for the e-contract based cloud computing
client. collaboration. Among the require tools for this
Step5: CA also sends the key and certificate engine are the SSL-based VPNs (virtual Private
to the VA. Networks). Such VPNs can provide a secure
Step6: Client sends request using the connectivity for a group of collaborative services
obtained key. by forming a virtual extranet within a cloud
Step7: Upon approval, VA communicates and/or between Clouds. Following the Chen et al
with the client using this key. work, we are also working on developing three
Amazon EC2 alike instances [17]. The first is for
Of course, the above mentioned interaction running OPEN VPN server v2.1 [18]. The
steps have to be extended in different aspects in second is for running a Web service deployed on
order to enable reliable and secure actions in the Apache tomcat v6.0 [19]. The third is for
cloud. Detailed and proper protocol running the Web service client. Java language is
implementations are required to be achieved to used for implementing the web service and client
take into account various possible threats in real applications. After completing the integration of
cloud computing settings. all parts of the system, a detailed evaluation
study will be performed to assess the total level
of trust offered by the whole framework.
CONCLUSION
Although that cloud computing gained a lot
of reputation, but still there is concern about this
concept throughout the world especially
regarding its security environments. In order to
make more organizations moves towards cloud
computing, strong mechanisms and technologies
are needed to be established such that to
overcome the problems of security, privacy, and
trust. In this paper, we have discussed security
and trust issues by reviewing recently developed
model that handles secure messaging and among
collaborative services within the environment of
cloud computing. We then described our
development on this model by adding new
Figure 5. The general architecture of the service layer that is responsible to increase trust
enhanced system for e-contract based cloud in such collaboration through proper integration
computing collaboration with PKI. As our work in the development of
J. of university of anbar for pure science : Vol.6:NO.2 : 2012
this system is still in progress, we will try to Intelligence and Software Engineering (CiSE),
deploy the best available security practices to Wuhan, China December 2010, pp. 1-3.
prevent possible threats from outsiders and [8]. Joe Nisha . “Cloud Computing – An
insiders. We believe that achieving this goal is overview on cloud computing concepts,” India
necessary to build the required level of trust in Study Channel, Posted on 06 Sep 2011.
cloud computing. [9] Pardeep Kumar, Vivek Kumar Sehgal , Durg
Singh Chauhan, P. K. Gupta and Manoj
REFERENCES Diwakar, “Effective Ways of Secure, Private and
Trusted Cloud Computing,” IJCSI International
[1] Shiping Chen, Surya Nepal, and Ren Ping Journal of Computer Science, May 2011.
Liu, "Secure Connectivity for Intra-cloud and [10] S. Srinivasamurthy, F. Wayne, and D. Q.
Inter-cloud Communication," ICPP Workshops, Liu, “Survey on Cloud Computing Security,”
2011, pp. 154-159. Computer, 2010 (available at
[2] Srinivasa Rao, Nageswara Rao, and Kusuma http://salsahpc.indiana.edu/CloudCom2010/).
Kumari, "Cloud computing: An overview,” [11] http://en.wikipedia.org/wiki/elecetonic_
Journal of Theoretical and Applied Information contract.
Technology, Vol.9, No.1, 2009. [12]. W. Zhao, "Implementation of Software
[3] Ahmad-Reza Sadeghi, Thomas Schneider, Tools for the Medium-Size Certification
and Marcel Winandy,"Token-based cloud Authority _ X.509 Certificate", ECE Dept.,
computing - Secure outsourcing of data and George Mason University, December 2003.
arbitrary computations with lower latency," 3rd [13]. http://en.wikipedia.org/wiki/ PKI (public
International Conference on Trust and key infrastructure).
Trustworthy Computing (TRUST'10) - [14] E. YILDIZ ,"A Proposal for Turkish
Workshop on Trust in the Cloud, June 22, Government Public Key Infrastructure Trust
Berlin, Germany. Model" , MSc Thesis, December 2001.
[4] Jeffrey Voas and Jia Zhang, "Cloud [15]. Sufyan T. F. Al-Janabi. and Amer Kais.
computing new wine or just new bottle,” Journal “Development of Certificate Authority Services
of IT Professional, Volume 11, Issue 2, March for Web Applications” The First International
2009. Conference on Future Communication Networks
[5] P. Mell and T. Grance, The NIST Definition (ICFCN ’2012), Baghdad, Iraq, April 2012
of Cloud Computing, National Institute of (Submitted).
Standards and Technology, 2009. [16] ITU-T Recommendation X.509, “The
[6] VICTOR DELGADO, “Exploring the limits Directory: Public Key and Attribute Certificates
of cloud computing,” Master of Science Thesis, Framework, 2000.
Stockholm, Sweden 2010. [17] Amazon EC2: http://aws.amazon.com/ec2/.
[7]. Jianfeng Yang and Zhibin Chen, “Cloud
Computing Research and Security Issues,” [18] OpenVPN: http://openvpn.net.
International Conference on Computational [19] Apache Tomcat: http://tomcat.apache.org/.