Tenant separation is a provision for cloud computing to be provided to tenants as a third party service, therefore the tenants' confidence in the security effectiveness of cloud tenant is critical to the promotion of cloud services. However, in a third party service such as cloud computing, tenants have few opportunities to take part in the construction and management of the infrastructure of cloud computing, making it hard for the tenants to trust the tenant separation mechanism in cloud. This paper views the transparency requirement as a part of trusted cloud tenant separation mechanism, implements a cloud tenant separation mechanism and its transparency requirement based on the inter-domain information flow control policy in cloud computing systems, and proves that the resulting cloud tenant separation mechanism is secure and effective by non-interference theory.
[1] Cloud Security Alliance. Security guidance for critical areas of focus in cloud computing. http://www.cloudsecurityalliance.org/ guidance/csaguide.pdf
[2] NIST. The NIST definition of cloud computing. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
[3] Survey: Cloud computing ‘no hype', but fear of security and control slowing adoption. http://www.circleid.com/posts/20090226_ cloud_computing_hype_security/
[5] Mather T, Kumaraswamy S, Latif S. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O'Reilly, 2009.
[6] Almond C. A Practical Guide to Cloud Computing Security. A White Paper from Accenture and Microsoft. 2009.
[7] Wang C, Wang Q, Ren K, Lou WJ. Privacy-Preserving public auditing for data storage security in cloud computing. In: Proc. of the 2010 IEEE INFOCOM. IEEE, 2010. 1-9. [doi: 10.1109/INFCOM.2010.5462173]
[8] Kaufman LM. Can a trusted environment provide security? Security & Privacy, IEEE, 2010,8(1):50-52. [doi: 10.1109/ MSP.2010.33]
[10] Khan KM, Malluhi Q. Establishing trust in cloud computing. IT Professional, 2010,12(5):20-27. [doi: 10.1109/MITP.2010.128]
[11] Huang J, Nicol DM. Trust mechanisms for cloud computing. Journal of Cloud Computing, 2013,2(1):1-14. [doi: 10.1186/2192- 113X-2-9]
[12] Sunyaev A, Schneider S. Cloud services certification. Communications of the ACM, 2013,56(2):33-36. [doi: 10.1145/2408776. 2408789]
[13] Kumar N, Chakraborti B, Kumar A, Giri S. Reduction of cost by implementing transparency in cloud computing through different approaches. In: Proc. of the 2014 Int'l Conf. on Advanced Communication Control and Computing Technologies (ICACCCT). IEEE, 2014. 1723-1725. [doi: 10.1109/ICACCCT.2014.7019403]
[14] Dev H, Ali ME, Sen T, Basak M. AntiqueData: A proxy to maintain computational transparency in cloud. In: Proc. of the Database Systems for Advanced Applications. Berlin, Heidelberg: Springer-Verlag, 2014. 256-267. [doi: 10.1007/978-3-662-43984-5_19]
[15] Rushby J. A formal model for MILS integration. Project Report, Menlo Park, CA: Computer Science Laboratory, SRI International, 2008.
[16] Barham P, Dragovic B, Fraser K, Hand S, Harris T, Ho A, Neugebauer R, Pratt I, Warfield A. Xen and the art of virtualization. ACM SIGOPS Operating Systems Review, 2003,37(5):164-177. [doi: 10.1145/1165389.945462]
[17] Mell P, Grance T. The NIST definition of cloud computing. National Institute of Standards and Technology, 2009,53(6):50.
[18] Chow R, Golle P, Jakobsson M, Masuoka R, Molina J. Controlling data in the cloud: Outsourcing computation without outsourcing control. In: Proc. of the 2009 ACM Workshop on Cloud Computing Security. ACM Press, 2009. 85-90. [doi: 10.1145/1655008. 1655020]
[19] Khan KM, Malluhi Q. Establishing trust in cloud computing. IT Professional, 2010,12(5):20-27. [doi: 10.1109/MITP.2010.128]
[21] Patel A, Dansena P. TPM as a middleware for enterprise data security. Int'l Journal of Computer Science and Mobile Computing, 2013,2(7):327-332.
[22] Kekkonen T, Kanstrén T, Hatonen K. Towards trusted environment in cloud monitoring. In: Proc. of the 2014 11th Int'l Conf. on Information Technology: New Generations (ITNG). IEEE, 2014. 180-185. [doi: 10.1109/ITNG.2014.104]
[23] Li XY, Zhou LT, Shi Y, Guo Y. A trusted computing environment model in cloud architecture. In: Proc. of the 2010 Int'l Conf. on Machine Learning and Cybernetics (ICMLC). IEEE, 2010. 2843-2848. [doi: 10.1109/ICMLC.2010.5580769]
[24] Varadharajan V, Tupakula U. TREASURE: Trust enhanced security for cloud environments. In: Proc. of the 2012 IEEE 11th Int'l Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2012. 145-152. [doi: 10.1109/ TrustCom.2012.283]
[25] Chen C, Raj H, Saroiu S, Wolman A. cTPM: A cloud TPM for cross-device trusted applications. In: Proc. of the 11th USENIX Conf. on Networked Systems Design and Implementation. 2014. 187-201.
[26] Gebhardt C, Dalton CI, Brown R. Preventing hypervisor-based rootkits with trusted execution technology. Network Security, 2008, 11(2008):7-12. [doi: 10.1016/S1353-4858(08)70128-4]
[27] Nie C. Dynamic root of trust in trusted computing. TKK T1105290 Seminar on Network Security, 2007.
[28] Singaravelu L, Pu C, Härtig H, Helmuth C. Reducing TCB complexity for security-sensitive applications: Three case studies. ACM SIGOPS Operating Systems Review, 2006,40(4):161-174. [doi: 10.1145/1217935.1217951]
[29] Murray DG, Milos G, Hand S. Improving Xen security through disaggregation. In: Proc. of the 4th ACM SIGPLAN/SIGOPS Int'l Conf. on Virtual Execution Environments. ACM Press, 2008. 151-160. [doi: 10.1145/1346256.1346278]
[30] Chen Y, Paxson V, Katz RH. What's new about cloud computing security. Berkeley Report, No.UCB/EECS-2010-5, University of California, 2010.
[31] Department of Defense. Trusted computer system evaluation criteria (orange book). DoD Computer Security Center, 1983. http://csrc.nist.gov/publications/history/dod85.pdf
[32] ISO/IEC 15408 Standard. Common criteria for information technology security evaluation version 3.1 revision 4. 2014. http://www. commoncriteriaportal.org/cc/
[33] Goguen JA, Meseguer J. Security policies and security models. In: Proc. of the IEEE Symp. on Security and Privacy. 1982. [doi: 10.1109/SP.1982.10014]
[34] Goguen JA, Meseguer J. Inference control and unwinding. In: Proc. of the 1984 Symp. on Security and Privacy. Oakland: IEEE Computer Society, 1984. 75-86. [doi: 10.1109/SP.1984.10019]
[35] Haigh JT, Young WD. Extending the noninterference version of MLS for SAT. IEEE Trans. on Software Engineering, 1987,2: 141-150. [doi: 10.1109/TSE.1987.226478]
[36] Rushby J. Noninterference, transitivity, and channel-control security policies. SRI Int'l, Computer Science Laboratory, 1992.
[37] Van Der Meyden R. What, indeed, is intransitive noninterference? In: Proc. of the Computer Security (ESORICS 2007). Berlin, Heidelberg: Springer-Verlag, 2007. 235-250. [doi: 10.1007/978-3-540-74835-9_16]
[38] Boettcher C, DeLong R, Rushby J, Sifre W. The MILS component integration approach to secure information sharing. In: Proc. of the IEEE/AIAA 27th Digital Avionics Systems Conf. (DASC 2008). IEEE, 2008. [doi: 10.1109/DASC.2008.4702758]