Choi et al., 2013 - Google Patents
Isolated mini-domain for trusted cloud computingChoi et al., 2013
View PDF- Document ID
- 10154658153601196708
- Author
- Choi J
- Park J
- Seol J
- Maeng S
- Publication year
- Publication venue
- 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing
External Links
Snippet
On the cloud system, guest domains for cloud customers can be attacked by one of administrators with privilege or remote hackers who can compromise management tools. Therefore, the customers need a guarantee that their domains run on the secure …
- 230000001010 compromised 0 description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mofrad et al. | A comparison study of intel SGX and AMD memory encryption technology | |
Buhren et al. | Insecure until proven updated: analyzing AMD SEV's remote attestation | |
Santos et al. | Towards Trusted Cloud Computing. | |
Vaquero et al. | Locking the sky: a survey on IaaS cloud security | |
Aslam et al. | Security and trust preserving VM migrations in public clouds | |
Shetty et al. | A survey on techniques of secure live migration of virtual machine | |
US20230325492A1 (en) | Secure Runtime Systems And Methods | |
Li et al. | Droidvault: A trusted data vault for android devices | |
Schear et al. | Bootstrapping and maintaining trust in the cloud | |
JP2016506107A (en) | Management control method, apparatus and system for virtual machine | |
Takahashi et al. | Enabling secure multitenancy in cloud computing: Challenges and approaches | |
Rocha et al. | Defense-in-depth against malicious insiders in the cloud | |
EP3790257B1 (en) | Security system for using shared computational facilities | |
Naruchitparames et al. | Enhancing data privacy and integrity in the cloud | |
Hosseinzadeh et al. | Recent trends in applying TPM to cloud computing | |
Fan et al. | An improved vTPM-VM live migration protocol | |
Morbitzer et al. | GuaranTEE: Introducing control-flow attestation for trusted execution environments | |
Condé et al. | Using Intel SGX to protect authentication credentials in an untrusted operating system | |
Mofrad et al. | Leveraging Intel SGX to create a nondisclosure cryptographic library | |
Sathya Narayana et al. | Trusted model for virtual machine security in cloud computing | |
Yan et al. | SplitDroid: isolated execution of sensitive components for mobile applications | |
Paladi et al. | Domain-based storage protection (DBSP) in public infrastructure clouds | |
Althobaiti | Analyzing security threats to virtual machines monitor in cloud computing environment | |
Choi et al. | Isolated mini-domain for trusted cloud computing | |
Oktay et al. | Circular chain VM protection in AdjointVM |