Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Xu, Lei | - |
dc.contributor.author | Lee, JongHyuk | - |
dc.contributor.author | Kim, Seung Hun | - |
dc.contributor.author | Zheng, Qingji | - |
dc.contributor.author | Xu, Shouhuai | - |
dc.contributor.author | Suh, Taeweon | - |
dc.contributor.author | Ro, Won Woo | - |
dc.contributor.author | Shi, Weidong | - |
dc.date.accessioned | 2021-09-02T12:54:51Z | - |
dc.date.available | 2021-09-02T12:54:51Z | - |
dc.date.created | 2021-06-16 | - |
dc.date.issued | 2018-04 | - |
dc.identifier.issn | 2168-7161 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/76257 | - |
dc.description.abstract | In cloud computing, it is often assumed that cloud vendors are trusted; the guest Operating System (OS) and the Virtual Machine Monitor (VMM, also called Hypervisor) are secure. However, these assumptions are not always true in practice and existing approaches cannot protect the data privacy of applications when none of these parties are trusted. We investigate how to cope with a strong threat model which is that the cloud vendors, the guest OS, or the VMM, or both of them are malicious or untrusted, and can launch attacks against privacy of trusted user applications. This model is relevant because applications may be small enough to be formally verified, while the guest OS and VMM are too complex to be formally verified. Specifically, we present the design and analysis of an architectural solution which integrates a set of components on-chip to protect the memory of trusted applications from potential software and hardware based attacks from untrusted cloud providers, compromised guest OS, or malicious VMM. Full-system performance evaluation results show that the design only incurs 9 percent overhead on average, which is a small performance price that is paid for the substantial security gain. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | SECURITY ARCHITECTURE | - |
dc.subject | ENCRYPTION | - |
dc.subject | PERFORMANCE | - |
dc.subject | SUPPORT | - |
dc.title | Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Suh, Taeweon | - |
dc.identifier.doi | 10.1109/TCC.2015.2511728 | - |
dc.identifier.scopusid | 2-s2.0-85048247685 | - |
dc.identifier.wosid | 000434476800015 | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON CLOUD COMPUTING, v.6, no.2, pp.478 - 491 | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON CLOUD COMPUTING | - |
dc.citation.title | IEEE TRANSACTIONS ON CLOUD COMPUTING | - |
dc.citation.volume | 6 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 478 | - |
dc.citation.endPage | 491 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | SECURITY ARCHITECTURE | - |
dc.subject.keywordPlus | ENCRYPTION | - |
dc.subject.keywordPlus | PERFORMANCE | - |
dc.subject.keywordPlus | SUPPORT | - |
dc.subject.keywordAuthor | Virtualization | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | architectural support | - |
dc.subject.keywordAuthor | hypervisor | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.