Nothing Special   »   [go: up one dir, main page]

Liu et al., 2013 - Google Patents

T-YUN: Trustworthiness verification and audit on the cloud providers

Liu et al., 2013

View PDF
Document ID
5452495672069569688
Author
Liu C
Lin J
Fang B
Publication year
Publication venue
IEICE TRANSACTIONS on Information and Systems

External Links

Snippet

Cloud computing is broadly recognized as as the prevalent trend in IT. However, in cloud computing mode, customers lose the direct control of their data and applications hosted by the cloud providers, which leads to the trustworthiness issue of the cloud providers …
Continue reading at www.jstage.jst.go.jp (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
US12032680B2 (en) Preserving confidentiality of tenants in cloud environment when deploying security services
US10778720B2 (en) System and method for security health monitoring and attestation of virtual machines in cloud computing systems
US9311483B2 (en) Local secure service partitions for operating system security
Zhang et al. Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
CN103270518B (en) Virtual machine verification system and method thereof
Zhang et al. CloudMonatt: An architecture for security health monitoring and attestation of virtual machines in cloud computing
Zhang et al. Security-preserving live migration of virtual machines in the cloud
Khan et al. Design and deployment of a trusted eucalyptus cloud
Lauer et al. Hypervisor-based attestation of virtual environments
Schiffman et al. Verifying system integrity by proxy
Kucab et al. Remote attestation and integrity measurements with Intel SGX for virtual machines
Price The paradox of security in virtual environments
Zhang et al. Design, implementation and verification of cloud architecture for monitoring a virtual machine's security health
Jacquin et al. The trust problem in modern network infrastructures
Lauer et al. Bootstrapping trust in a" trusted" virtualized platform
Liu et al. T-YUN: Trustworthiness verification and audit on the cloud providers
Sun et al. Cloud armor: Protecting cloud commands from compromised cloud services
Sood Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks
Feng et al. The theory and practice in the evolution of trusted computing
Baiardi et al. Measuring semantic integrity for remote attestation
Song et al. Tz-ima: Supporting integrity measurement for applications with arm trustzone
Jin et al. Trusted attestation architecture on an infrastructure-as-a-service
Zhang Detection and mitigation of security threats in cloud computing
Celesti et al. Remote and deep attestations to mitigate threats in cloud mash-up services
Lioy et al. Trust in SDN/NFV environments