asiaccs10

asiaccs10 - RunTest: Assuring Integrity of Dataflow...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: RunTest: Assuring Integrity of Dataflow Processing in Cloud Computing Infrastructures Juan Du, Wei Wei, Xiaohui Gu, and Ting Yu Department of Computer Science North Carolina State University Raleigh, North Carolina, USA {jdu,wwei5}@ ncsu.edu, {gu,yu}@ csc.ncsu.edu ABSTRACT Cloud computing has emerged as a multi-tenant resource shar- ing platform, which allows different service providers to deliver software as services in an economical way. However, for many security sensitive applications such as critical data processing, we must provide necessary security protection for migrating those crit- ical application services into shared open cloud infrastructures. In this paper, we present RunTest , a scalable runtime integrity attes- tation framework to assure the integrity of dataflow processing in cloud infrastructures. RunTest provides light-weight application- level attestation methods to dynamically verify the integrity of data processing results and pinpoint malicious service providers when inconsistent results are detected. We have implemented RunTest within IBM System S dataflow processing system and tested it on NCSU virtual computing lab. Our experimental results show that our scheme is effective and imposes low performance impact for dataflow processing in the cloud infrastructure. Categories and Subject Descriptors H.4.0 [ Information Systems Applications ]: General General Terms Security, Management, Verification Keywords Service Integrity Attestation, Cloud Computing, Secure Dataflow Processing 1. INTRODUCTION Cloud computing [1, 3] has recently emerged as a promising hosting platform that allows multiple cloud users called tenants to share a common physical computing infrastructure. With rapid adoption of the concepts of Software as a Service (SaaS) [4] and Service Oriented Architecture (SOA) [9,18], the Internet has evolved into an important service delivery infrastructure instead of merely providing host connectivity. Thus, service providers can lease a set Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ASIACCS10 April 1316, 2010, Beijing, China. Copyright 2010 ACM 978-1-60558-936-7 ...$10.00. of resources from cloud infrastructures to provide their software as services in an economical way without maintaining their own physical computing infrastructures. Data-intensive computing [2, 17, 21, 28] has recently received much research attention with many real world applications such as security surveillance, scientific study, and business intelligence....
View Full Document

Page1 / 12

asiaccs10 - RunTest: Assuring Integrity of Dataflow...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online