att_abstract={{Modern cloud computing infrastructures use virtual machine monitors (VMMs) that often include a large and complex administrative domain with privileges to inspect client VM state. Attacks against or misuse of the administrative domain can compromise client security and privacy. Moreover, these VMMs provide clients inflexible control over their own VMs, as a result of which clients have to rely on the cloud provider to deploy useful services, such as VM introspection-based security tools.
We introduce a new self-service cloud (SSC) computing model that addresses these two shortcomings. SSC splits administrative privileges between a system-wide domain and per-client administrative domains. Each client can manage and perform privileged system tasks on its own VMs, thereby providing flexibility. The system-wide administrative domain cannot inspect the code, data or computation of client VMs, thereby ensuring security and privacy. SSC also allows providers and clients to establish mutually trusted services that can check regulatory compliance while respecting client privacy. We have implemented SSC by modifying the Xen hypervisor. We demonstrate its utility by building user do- mains to perform privileged tasks such as memory introspection, storage intrusion detection, and anomaly detection.}},
	att_copyright_notice={{(c) ACM, 2012. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in 2012 {{, 2012-10-16}}.
	att_tags={Cloud Computing,  Security,   Architecture},
	author={Abhinav Srivastava and Shakeel Butt and Vinod Ganapathy and Andres Lagar-Cavilla},
	institution={{ACM CCS 2012}},
	title={{Self-service Cloud Computing}},