SpringerOpen Newsletter

Receive periodic news and updates relating to SpringerOpen.

Open Access Research

Towards a cloud-based integrity measurement service

John Zic1* and Thomas Hardjono2

Author Affiliations

1 CSIRO ICT Centre, PO Box 76, Epping, NSW, 1710, Australia

2 MIT Kerberos and Internet Trust Consortium, Massachusetts Institute of Technology, Cambridge, MA, 02139, USA

For all author emails, please log on.

Journal of Cloud Computing: Advances, Systems and Applications 2013, 2:4  doi:10.1186/2192-113X-2-4

Published: 13 February 2013

Abstract

The aim of this paper is to propose the use of a cloud-based integrity management service coupled with a trustworthy client component – in the form of the Trust Extension Device (TED) platform – as a means to to increase the quality of the security evaluation of a client. Thus, in addition to performing authentication of the client (e.g. as part of Single Sign-On), the Identity Provider asks that the integrity of the client platform be computed and then be evaluated by a trustworthy and independent Cloud-based Integrity Measurement Service (cIMS). The TED platform has been previously developed based on the Trusted Platform Module (TPM), and allows the integrity measurement of the client environment to be conducted and reported in a secure manner. Within the SSO flow, the portable TED device performs an integrity measurement of the client platform, and sends an integrity report to the cIMS as part of the client authentication process. The cIMS validates the measurements performed by the TED device, and reports a trust score to the Identity Provider (IdP). The IdP takes into account the reported trust score when the IdP computes and issues a Level of Assurance (LOA) value to the client platform. In this way the Service Provider obtains a greater degree of assurance that the client’s computing environment is relatively free of unrecognized and/or unauthorized components.