Sok: Introspections on trust and the semantic gap

B Jain, MB Baig, D Zhang, DE Porter… - 2014 IEEE symposium …, 2014 - ieeexplore.ieee.org
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …

[PDF][PDF] 可信云服务

丁滟, 王怀民, 史佩昌, 吴庆波, 戴华东, 富弘毅 - 计算机学报, 2015 - cjc.ict.ac.cn
摘要云服务是一类依托于云计算平台的新兴网络服务, 其外包服务模式以及云平台自身的安全
风险引起了用户的信任问题. 云服务可信与否成为用户业务向云迁移的最大顾虑 …

Using hints to improve inline block-layer deduplication

S Mandal, G Kuenning, D Ok, V Shastry… - … USENIX Conference on …, 2016 - usenix.org
Block-layer data deduplication allows file systems and applications to reap the benefits of
deduplication without requiring per-system or per-application modifications. However …

Engineering intrusion prevention services for iaas clouds: The way of the hypervisor

S Laniepce, M Lacoste, M Kassi-Lahlou… - 2013 IEEE seventh …, 2013 - ieeexplore.ieee.org
Strong user expectations for protecting their cloud-hosted IT systems make enhanced
security a key element for cloud adoption. This means that cloud infrastructure security …

Improving {I/O} Performance Using Virtual Disk Introspection

V Tarasov, D Jain, D Hildebrand, R Tewari… - 5th USENIX Workshop …, 2013 - usenix.org
Storage consolidation due to server virtualization puts stringent new requirements on
Storage Array (SA) performance. Virtualized workloads require new performance …

Dynamic security properties monitoring architecture for cloud computing

A Muñoz, A Maña, J González - Security Engineering for Cloud …, 2013 - igi-global.com
In this chapter, the authors provide an overview of the importance of the monitoring of
security properties in cloud computing scenarios. They then present an approach based on …

VMInformant: an instrumented virtual machine to support trustworthy cloud computing

T Al-Said, O Rana, P Burnap - International Journal of High …, 2015 - inderscienceonline.com
We describe how a virtual machine (VM) owner can increase visibility about how a VM and
its data are stored and processed in the cloud. We present'VMInformant', a monitoring …

Designing a secure cloud architecture: The SeCA model

T Baars, M Spruit - International Journal of Information Security and …, 2012 - igi-global.com
Security issues are paramount when considering adoption of any cloud technology. This
article proposes the Secure Cloud Architecture (SeCA) model on the basis of data …

Fast algorithm and hardware architecture for modular inversion in GF (p)

C Chen, Z Qin - … on Intelligent Networks and Intelligent Systems, 2009 - ieeexplore.ieee.org
Modular inversion in the Galois field GF (p) is a part of the kernel arithmetic operations used
by many public key cryptosystems, and its high-speed hardware design is necessary. A fast …

Agentless cloud-wide monitoring of virtual disk state

W Richter - Proceedings of the 2014 workshop on PhD forum, 2014 - dl.acm.org
Virtualized clouds have transformed computing into a managed, metered utility. With a
single command-line program, or a few clicks in a web browser, a cloud customer can …