In Chapters 3 and 4, we described how a service provider can ensure that the infrastructure on which the workloads and applications are instantiated has boot integrity, and how these workloads can be placed in trusted pools with compute assets exhibiting demonstrated trust that is rooted in hardware. This model provides an excellent framework for a trusted compute infrastructure, but it's not sufficient for the cloud. Cloud data centers today almost invariably run virtualized. Stopping the chain of trust at the bare hypervisor is clearly insufficient; that is but the proverbial tip of the iceberg. Protection needs to be extended to support the multi-tenancy and virtualized networks of the cloud. Extending the chain of trust described to encompass these virtualized resources, embodied in the concept of trusted virtual machines, is what this chapter is about.
CITATION STYLE
Yeluri, R., & Castro-Leon, E. (2014). Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud. In Building the Infrastructure for Cloud Security (pp. 161–178). Apress. https://doi.org/10.1007/978-1-4302-6146-9_8
Mendeley helps you to discover research relevant for your work.