Filters








9,045 Hits in 7.1 sec

Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud [chapter]

Raghu Yeluri, Enrique Castro-Leon
2014 Building the Infrastructure for Cloud Security  
Step 3: Once the encrypted virtual machine image and associated metadata are posted in the cloud, the virtual machine can be launched using the cloud service provider's existing mechanism for launching  ...  Critical concerns for cloud users are for protecting workloads and data in the cloud and from the cloud, and for ensuring trust and integrity for virtual machine images launched on a service provider's  ... 
doi:10.1007/978-1-4302-6146-9_8 fatcat:bpc2ioqxkbdplmert357izqr6u

The Trusted Cloud: Addressing Security and Compliance [chapter]

Raghu Yeluri, Enrique Castro-Leon
2014 Building the Infrastructure for Cloud Security  
The Trusted Virtual Machine Launch Usage Model A trusted platform boot capability provides a safe launch environment for provisioning virtual machines running workloads.  ...  Each virtual machine launched on a virtual machine manager and hypervisor platform benefits from a hardware root of trust by storing the launch measurements of the virtual machines' sealing and remote  ... 
doi:10.1007/978-1-4302-6146-9_2 fatcat:k2wmlqogxzfbvhr6mle2wuwgze

Platform Boot Integrity: Foundation for Trusted Compute Pools [chapter]

Raghu Yeluri, Enrique Castro-Leon
2014 Building the Infrastructure for Cloud Security  
for a trusted compute pool.  ...  Platform Boot Integrity: Foundation for Trusted Compute Pools In Chapter 2, we introduced the concept of trusted clouds and the key usage models to enable a trusted infrastructure.  ... 
doi:10.1007/978-1-4302-6146-9_3 fatcat:z5lukpm6szf23jlnujjnmqhv4i

Trusted Launch of Virtual Machine Instances in Public IaaS Environments [chapter]

Nicolae Paladi, Christian Gehrmann, Mudassar Aslam, Fredric Morenius
2013 Lecture Notes in Computer Science  
In this paper we present a protocol to ensure the launch of a virtual machine (VM) instance on a trusted remote compute host.  ...  At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security mechanism for IaaS.  ...  A trusted launch protocol for virtual machine images in IaaS environments Based on the above requirements for a trusted launch protocol for VM instances in IaaS environments, we present a platform-agnostic  ... 
doi:10.1007/978-3-642-37682-5_22 fatcat:caz3fb3ldbcoxbja3aagtnqrvu

Securing Authentication and Trusted Migration of Weblets in the Cloud with Reduced Traffic

John Panneerselvam, Stelios Sotiriadis, Nik Bessis, Nick Antonopoulos
2012 2012 Third International Conference on Emerging Intelligent Data and Web Technologies  
Cloud computing is making a new revolution in the computing world. Elasticity is one of the key features of the cloud which makes cloud computing further fashionable.  ...  Cloud is still in its infant stages and it faces a wide range of security threats. The security downtime of cloud is relatively slowing down the spreading up of cloud computing.  ...  For launching the weblets, users need a mobile device. The mobile device used by the users can be any of the computing devices such as a mobile phone or a stand-alone computer.  ... 
doi:10.1109/eidwt.2012.20 dblp:conf/eidwt/PanneerselvamSBA12 fatcat:wijqs2j6pffrrb6zrqiorbxe5i

A Survey on Security Issues in Cloud Computing [article]

Rohit Bhadauria, Rituparna Chaki, Nabendu Chaki, Sugata Sanyal
2013 arXiv   pre-print
In a cloud computing environment, the entire data reside over a set of networked resources, enabling the data to be accessed through virtual machines.  ...  There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario.  ...  A SNORT like intrusion detection mechanism is loaded onto the virtual machine for sniffing all traffics, either incoming, or out-going.  ... 
arXiv:1109.5388v2 fatcat:gmhwf7a3uvgvnkq2b2tnvgeadu

TAMEC: Trusted Augmented Mobile Execution on Cloud

Syed Luqman Shah, Irshad Ahmed Abbasi, Alwalid Bashier Gism Elseed, Sikandar Ali, Zahid Anwar, Qasim Rajpoot, Maria Riaz, Shah Nazir
2021 Scientific Programming  
Mobile devices with access to Internet are also turning towards clouds for resource-intensive tasks by working out a trade-off between resources required for performing computation on-device against those  ...  This gives a comprehensive solution for end-to-end secure and trusted interaction of the mobile device with cloud hosts.  ...  Virtualization is a mechanism of dividing hardware or some subset of hardware of a computer system among several virtual machines (VMs), which bear resemblance to the physical system.  ... 
doi:10.1155/2021/5542852 fatcat:dxxkojf4mnaqhd73knwrvkwk2y

Attestation for Trusted Computing to Assure Security in Cloud Deployment Services

Udhayakumar Shanmugam
2012 International Journal of Information and Electronics Engineering  
Security assurance in cloud computing environment is a major challenge associated with lack of trust and vulnerability to unauthenticated access that requires the providers to secure virtualized data centers  ...  To improve the customer's confidence on cloud, trust has to be restored by developing trusted computing model for various cloud services ranging from storage, network, and infrastructure to everything  ...  node for multitenant machine computing and trusted inter-operability [1] .  ... 
doi:10.7763/ijiee.2012.v2.179 fatcat:xncefy2nb5fjte5uv2zxb4mhw4

Providing User Security Guarantees in Public Infrastructure Clouds

Nicolae Paladi, Christian Gehrmann, Antonis Michalas
2017 IEEE Transactions on Cloud Computing  
In this paper, we describe a framework for data and operation security in IaaS, consisting of protocols for a trusted launch of virtual machines and domain-based storage protection.  ...  The protocols allow trust to be established by remotely attesting host platform configuration prior to launching guest virtual machines and ensure confidentiality of data in remote storage, with encryption  ...  A DM i wishes to launch or has launched an arbitrary virtual machine vm i l on a compute host in the set CH SPi .  ... 
doi:10.1109/tcc.2016.2525991 fatcat:lsrluqgmkbhbbp7lwww3ebajsm

Enhancing Security in Cloud Using Trusted Monitoring Framework

M. Arun Fera, C. manikandaprabhu, Ilakiya Natarajan, K. Brinda, R. Darathiprincy
2015 Procedia Computer Science  
Cloud computing is a technology that provides network based services on demand. Cloud computing technology provides advantages to end users and business organizations.  ...  We design a trusted monitoring framework, which provides a chain of trust that excludes the untrusted privileged domain, as well as utilizing the trusted computing technology to ensure the integrity of  ...  Virtualization is a pillar technology in cloud computing for multiplexing computing resources on a single cloud platform for multiple cloud tenants.  ... 
doi:10.1016/j.procs.2015.04.170 fatcat:7hh2rozjyjftdlccgxfriykmd4

Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques

Rohit Bhadauria, Sugata Sanyal
2012 International Journal of Computer Applications  
In a cloud computing environment, the entire data reside over a set of networked resources, enabling the data to be accessed through virtual machines.  ...  There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario.  ...  ACKNOWLEDGEMENTS The authors are extremely thankful to Nabendu Chaki, Rituparna Chaki and Chandrakant Sakharwade for their invaluable suggestions towards the improvement of the paper.  ... 
doi:10.5120/7292-0578 fatcat:yt6coxs3m5fonpnny6vcjnv3jy

Distributed port-scan attack in cloud environment

Prachi Deshpande, Aditi Aggarwal, S.C. Sharma, P.Sateesh Kumar, Ajith Abraham
2013 2013 Fifth International Conference on Computational Aspects of Social Networks  
Cloud Computing is becoming a promising technology for processing a huge chunk of data. Hence, its security aspect has drawn the attentions of researchers and academician.  ...  The security of the cloud environment must be reliable as well as scalable. The cloud environment is vulnerable to many security attacks. Attacks can be launched individually or in tandem.  ...  Similarly, in distributed port-scanning, multiple virtual machines launch the attack on a host in the cloud infrastructure.  ... 
doi:10.1109/cason.2013.6622595 dblp:conf/cason/DeshpandeASKA13 fatcat:ve5jdv7tqvha3njzjegyoscaru

Detail Study of Cloud Infrastructure Attacks and Security Techniques

Surendranath Singh B.G, Research Scholar, Department of Computer Science & Engineering, LNCT University, Bhopal, Madhya Pradesh, India., Dr. Sunil Phulre, Associate Professor, Department of Computer Science & Engineering, LNCT University, Bhopal, Madhya Pradesh, India.
2021 International Journal of Innovative Research in Computer Science & Technology  
Cloud computing is Internet-based computing and the next stage in the evolution of the internet.  ...  This paper gives a detailed survey on IAAS security issues. A virtual machine should be secured to handle data and maintain privacy.  ...  It was found that node or virtual machine trust was evaluated based on continuous monitoring of sessions established between machines.  ... 
doi:10.21276/ijircst.2021.9.2.4 fatcat:cphxwtf4bjhbpfdsukwfzxx6ve

Taxonomy of Cloud Security

Sanchika Gupta, Padam Kumar
2013 International Journal of Computer Science Engineering and Applications  
CL-1: VT-2: FP-8: Insecure SSL trust: There are some serious flaws found in the SSL protocol used for secure communication on the internet.  ...  The pay per usage concept of Cloud computing increases the resource utilisation of a vendor's computing power and resources; at the same time,it results in reduced hardware costs forits users.  ...  CL-1: VT-3: VR-6: VM Escape: A virtual machine escape is an attack in which an attacker runs a specific code on the virtual machine that allows the host operating system to break out and interact with  ... 
doi:10.5121/ijcsea.2013.3505 fatcat:laoqx3yeazah7blsprybzc3ofi

Security Aspects of Virtualization in Cloud Computing [chapter]

Muhammad Kazim, Rahat Masood, Muhammad Awais Shibli, Abdul Ghafoor Abbasi
2013 Lecture Notes in Computer Science  
Specifically, we have identified: i) security requirements for virtualization in Cloud computing which can be used as a step towards securing virtual infrastructure of Cloud, ii) attacks that can be launched  ...  In Cloud computing, virtualization is the basis of delivering Infrastructure as a Service (IaaS) that separates data, network, applications and machines from hardware constraints.  ...  Furthermore, security principles for the development of trusted computing system such as economy of mechanism, complete mediation, open design, principle of least privilege, psychological acceptability  ... 
doi:10.1007/978-3-642-40925-7_22 fatcat:stn6viomirfr7axqd267fqehwm
« Previous Showing results 1 — 15 out of 9,045 results