Liu et al., 2013 - Google Patents
T-YUN: Trustworthiness verification and audit on the cloud providersLiu et al., 2013
View PDF- Document ID
- 5452495672069569688
- Author
- Liu C
- Lin J
- Fang B
- Publication year
- Publication venue
- IEICE TRANSACTIONS on Information and Systems
External Links
Snippet
Cloud computing is broadly recognized as as the prevalent trend in IT. However, in cloud computing mode, customers lose the direct control of their data and applications hosted by the cloud providers, which leads to the trustworthiness issue of the cloud providers …
- 238000000034 method 0 description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12032680B2 (en) | Preserving confidentiality of tenants in cloud environment when deploying security services | |
US10778720B2 (en) | System and method for security health monitoring and attestation of virtual machines in cloud computing systems | |
US9311483B2 (en) | Local secure service partitions for operating system security | |
Zhang et al. | Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization | |
CN103270518B (en) | Virtual machine verification system and method thereof | |
Zhang et al. | CloudMonatt: An architecture for security health monitoring and attestation of virtual machines in cloud computing | |
Zhang et al. | Security-preserving live migration of virtual machines in the cloud | |
Khan et al. | Design and deployment of a trusted eucalyptus cloud | |
Lauer et al. | Hypervisor-based attestation of virtual environments | |
Schiffman et al. | Verifying system integrity by proxy | |
Kucab et al. | Remote attestation and integrity measurements with Intel SGX for virtual machines | |
Price | The paradox of security in virtual environments | |
Zhang et al. | Design, implementation and verification of cloud architecture for monitoring a virtual machine's security health | |
Jacquin et al. | The trust problem in modern network infrastructures | |
Lauer et al. | Bootstrapping trust in a" trusted" virtualized platform | |
Liu et al. | T-YUN: Trustworthiness verification and audit on the cloud providers | |
Sun et al. | Cloud armor: Protecting cloud commands from compromised cloud services | |
Sood | Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks | |
Feng et al. | The theory and practice in the evolution of trusted computing | |
Baiardi et al. | Measuring semantic integrity for remote attestation | |
Song et al. | Tz-ima: Supporting integrity measurement for applications with arm trustzone | |
Jin et al. | Trusted attestation architecture on an infrastructure-as-a-service | |
Zhang | Detection and mitigation of security threats in cloud computing | |
Celesti et al. | Remote and deep attestations to mitigate threats in cloud mash-up services | |
Lioy et al. | Trust in SDN/NFV environments |