Date Published: December 2015 
                    
                            
                Author(s)
                
                        Michael Bartock (NIST),                         Murugiah Souppaya (NIST),                         Raghuram Yeluri (Intel),                         Uttam Shetty (Intel),                         James Greene (Intel),                         Steve Orrin (Intel),                         Hemma Prafullchandra (HyTrust),                         John McLeese (HyTrust),                         Karen Scarfone (Scarfone Cybersecurity)                
                
                        
                        This publication explains selected security challenges involving Infrastructure as a Service (IaaS) cloud computing technologies and geolocation. It then describes a proof of concept implementation that was designed to address those challenges. The publication provides sufficient details about the proof of concept implementation so that organizations can reproduce it if desired. The publication is intended to be a blueprint or template that can be used by the general security community to validate and implement the described proof of concept implementation.
                                
                                    This publication explains selected security challenges involving Infrastructure as a Service (IaaS) cloud computing technologies and geolocation. It then describes a proof of concept implementation that was designed to address those challenges. The publication provides sufficient details about the...
                                    
See full abstract
                                
                                    This publication explains selected security challenges involving Infrastructure as a Service (IaaS) cloud computing technologies and geolocation. It then describes a proof of concept implementation that was designed to address those challenges. The publication provides sufficient details about the proof of concept implementation so that organizations can reproduce it if desired. The publication is intended to be a blueprint or template that can be used by the general security community to validate and implement the described proof of concept implementation.
                                    Hide full abstract
                                 
                         
                                            Keywords
                        
                                cloud computing;                                 geolocation;                                 Infrastructure as a Service (IaaS);                                 roots of trust;                                 virtualization                        
                 
            Control Families
            
                    
                            Access Control;                             Audit and Accountability;                             Configuration Management;                             System and Communications Protection;                             System and Information Integrity