메뉴 건너뛰기




Volumn 91, Issue 1, 2011, Pages 93-118

Locking the sky: A survey on IaaS cloud security

Author keywords

Cloud computing; IaaS; Multitenancy; Security

Indexed keywords

CLOUD SYSTEMS; ENCRYPTION TECHNIQUE; IAAS; INFRASTRUCTURE MANAGEMENTS; ISSUES AND CHALLENGES; MULTI TENANTS; MULTITENANCY; OVERALL COSTS; SECURITY; SECURITY FIELDS; SECURITY RISKS; STATE OF THE ART; TIME TO MARKET;

EID: 79751493181     PISSN: 0010485X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00607-010-0140-x     Document Type: Article
Times cited : (183)

References (71)
  • 1
    • 77953221164 scopus 로고    scopus 로고
    • Securing elasticity in the cloud
    • Owens CD (2010) Securing elasticity in the cloud. Commun ACM 53(6):46-51. http://10.1145/1743546.1743565
    • (2010) Commun ACM , vol.53 , Issue.6 , pp. 46-51
    • Owens, C.D.1
  • 2
  • 4
    • 69349098776 scopus 로고    scopus 로고
    • Cloud computing and the common man
    • 10.1109/MC.2009.252
    • J Viega 2009 Cloud computing and the common man Computer 42 106 108 10.1109/MC.2009.252
    • (2009) Computer , vol.42 , pp. 106-108
    • Viega, J.1
  • 6
    • 79751490146 scopus 로고    scopus 로고
    • CSA: Cloud security guide cloud security alliance
    • CSA: Cloud security guide (2009) Tech. rep., cloud security alliance. http://www.cloudsecurityalliance.org/csaguide.pdf
    • (2009) Tech. Rep.
  • 15
    • 77952281110 scopus 로고    scopus 로고
    • Providing secure services for a virtual infrastructure
    • Baldwin A, Dalton C, Shiu S, Kostienko K, Rajpoot Q (2009) Providing secure services for a virtual infrastructure. SIGOPS Oper Syst Rev 43(1):44-51. http://doi.acm.org/10.1145/1496909.1496919
    • (2009) SIGOPS Oper Syst Rev , vol.43 , Issue.1 , pp. 44-51
    • Baldwin, A.1    Dalton, C.2    Shiu, S.3    Kostienko, K.4    Rajpoot, Q.5
  • 20
    • 54049137283 scopus 로고    scopus 로고
    • Virtualization and hardware-based security
    • Perez R, van Doorn L, Sailer R (2008) Virtualization and hardware-based security. IEEE Secur Privacy 6(5):24-31. http://dx.doi.org/10.1109/MSP.2008.135
    • (2008) IEEE Secur Privacy , vol.6 , Issue.5 , pp. 24-31
    • Perez, R.1    Van Doorn, L.2    Sailer, R.3
  • 21
    • 52049083714 scopus 로고    scopus 로고
    • Ixiv vmm: A vmm on 2-level ring architecture. In: Computer and information technology
    • Aoyagi S, Oikawa S (2008) Ixiv vmm: a vmm on 2-level ring architecture. In: Computer and information technology, IEEE 8th international conference on 0:533-538. http://doi.ieeecomputersociety.org/10.1109/CIT.2008.Workshops.62
    • (2008) IEEE 8th International Conference , vol.0 , pp. 533-538
    • Aoyagi, S.1    Oikawa, S.2
  • 22
  • 24
    • 34250017073 scopus 로고    scopus 로고
    • Hiding virtualization from attackers and malware
    • DOI 10.1109/MSP.2007.63
    • M Carpenter T Liston E Skoudis 2007 Hiding virtualization from attackers and malware IEEE Secur Privacy 5 62 65 10.1109/MSP.2007.63 (Pubitemid 46883436)
    • (2007) IEEE Security and Privacy , vol.5 , Issue.3 , pp. 62-65
    • Carpenter, M.1    Liston, T.2    Skoudis, E.3
  • 25
  • 26
    • 74349098073 scopus 로고    scopus 로고
    • Efficient cache attacks on aes, and countermeasures
    • 10.1007/s00145-009-9049-y 2578662
    • E Tromer DA Osvik A Shamir 2009 Efficient cache attacks on aes, and countermeasures J Cryptol 23 1 37 71 10.1007/s00145-009-9049-y 2578662
    • (2009) J Cryptol , vol.23 , Issue.1 , pp. 37-71
    • Tromer, E.1    Osvik, D.A.2    Shamir, A.3
  • 27
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Advances in Cryptology - CRYPTO '96
    • Kocher PC (1996) Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: CRYPTO '96: Proceedings of the 16th annual international cryptology conference on advances in cryptology, pp 104-113. Springer, London, UK (Pubitemid 126106234)
    • (1996) Lecture Notes in Computer Science , Issue.1109 , pp. 104-113
    • Kocher, P.C.1
  • 30
    • 54049158161 scopus 로고    scopus 로고
    • I/o for virtual machine monitors: Security and performance issues
    • Karger PA, Safford DR (2008) I/o for virtual machine monitors: Security and performance issues. IEEE Secur Privacy 6(5):16-23. http://dx.doi.org/10. 1109/MSP.2008.119
    • (2008) IEEE Secur Privacy , vol.6 , Issue.5 , pp. 16-23
    • Karger, P.A.1    Safford, D.R.2
  • 31
    • 77955212682 scopus 로고    scopus 로고
    • Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • Wang Z, Jiang X (2010) Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In: 31st IEEE symposium on security and privacy
    • (2010) 31st IEEE Symposium on Security and Privacy
    • Wang, Z.1    Jiang, X.2
  • 33
    • 33846280529 scopus 로고    scopus 로고
    • Multi-level security requirements for hypervisors
    • DOI 10.1109/CSAC.2005.41, 1565254, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
    • Karger PA (2005) Multi-level security requirements for hypervisors. In: ACSAC '05: Proceedings of the 21st annual computer security applications conference, pp 267-275. IEEE Computer Society, Washington, DC, USA. http://dx.doi.org/10.1109/CSAC.2005.41 (Pubitemid 46116483)
    • (2005) Proceedings - Annual Computer Security Applications Conference, ACSAC , vol.2005 , pp. 267-275
    • Karger, P.A.1
  • 35
    • 21644455412 scopus 로고    scopus 로고
    • Terra: A virtual machine-based platform for trusted computing
    • SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
    • Garfinkel T, Pfaff B, Chow J, Rosenblum M, Boneh D (2003) Terra: a virtual machine-based platform for trusted computing. In: Proceedings of the nineteenth ACM symposium on operating systems principles, pp 193-206. ACM Press (Pubitemid 40929697)
    • (2003) Operating Systems Review (ACM) , vol.37 , Issue.5 , pp. 193-206
    • Garfinkel, T.1    Pfaff, B.2    Chow, J.3    Rosenblum, M.4    Boneh, D.5
  • 43
    • 78650092266 scopus 로고    scopus 로고
    • Trusted-computing technologies for the protection of critical information systems
    • A Lioy G Ramunno D Vernizzi 2009 Trusted-computing technologies for the protection of critical information systems J Inform Assur Secur 4 449 457
    • (2009) J Inform Assur Secur , vol.4 , pp. 449-457
    • Lioy, A.1    Ramunno, G.2    Vernizzi, D.3
  • 44
    • 71749111778 scopus 로고    scopus 로고
    • Towards trusted cloud computing
    • Nuno Santos Krishna P, Gummadi RR (2009) Towards trusted cloud computing. In: Hot Cloud. http://www.usenix.org/event/hotcloud09/tech/full-papers/santos. pdf
    • (2009) Hot Cloud
    • Nuno Santos Krishna, P.1    Gummadi, R.R.2
  • 46
    • 84869381552 scopus 로고    scopus 로고
    • Deconstructing a secure processor
    • Tarnovsky C (2010) Deconstructing a secure processor. In: Black hat briefings federal. http://www.blackhat.com/presentations/bhdc10/Tarnovsky-Chris/ BlackHat%DC2010TarnovskyDASPslides.pdf
    • (2010) Black Hat Briefings Federal
    • Tarnovsky, C.1
  • 47
    • 17444392883 scopus 로고    scopus 로고
    • Protecting client privacy with trusted computing at the server
    • DOI 10.1109/MSP.2005.49
    • Iliev A, Smith SW (2005) Protecting client privacy with trusted computing at the server. IEEE Secur Privacy 3(2):20-28. http://dx.doi.org/10.1109/MSP. 2005.49 (Pubitemid 40542058)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.2 , pp. 20-28
    • Iliev, A.1    Smith, S.W.2
  • 50
    • 79751477919 scopus 로고    scopus 로고
    • The genesis kernel: a virtual network operating system for spawning network architectures (1999)
    • The genesis kernel: a virtual network operating system for spawning network architectures (1999)
  • 51
    • 21644433634 scopus 로고    scopus 로고
    • Xen and the art of virtualization
    • SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
    • Barham P, Dragovic B, Fraser K, Hand S, Harris T, Ho A, Neugebauer R, Pratt I, Warfield A (2003) Xen and the art of virtualization. In: SOSP '03: Proceedings of the nineteenth ACM symposium on operating systems principles, pp 164-177. ACM, New York, NY, USA. http://doi.acm.org/10.1145/945445.945462 (Pubitemid 40929695)
    • (2003) Operating Systems Review (ACM) , vol.37 , Issue.5 , pp. 164-177
    • Barham, P.1    Dragovic, B.2    Fraser, K.3    Hand, S.4    Harris, T.5    Ho, A.6    Neugebauer, R.7    Pratt, I.8    Warfield, A.9
  • 53
    • 0035400671 scopus 로고    scopus 로고
    • Dynamic Internet overlay deployment and management using the X-Bone
    • DOI 10.1016/S1389-1286(01)00172-4, PII S1389128601001724
    • Touch J (2001) Dynamic internet overlay deployment and management using the x-bone. Comput Netw 36(2-3):117-135. http://dx.doi.org/10.1016/S1389- 1286(01)00172-4 (Pubitemid 32420940)
    • (2001) Computer Networks , vol.36 , Issue.2-3 , pp. 117-135
    • Touch, J.1
  • 54
    • 0036036742 scopus 로고    scopus 로고
    • Resilient overlay networks
    • DOI 10.1145/502059.502048
    • Andersen D, Balakrishnan H, Kaashoek F, Morris R (2001) Resilient overlay networks. In: SOSP '01: Proceedings of the eighteenth ACM symposium on operating systems principles, pp 131-145. ACM, New York, NY, USA. http://doi.acm.org/10.1145/502034.502048 (Pubitemid 33612610)
    • (2001) Operating Systems Review (ACM) , vol.35 , Issue.5 , pp. 131-145
    • Andersen, D.1    Balakrishnan, H.2    Kaashoek, F.3    Morris, R.4
  • 55
    • 33750303852 scopus 로고    scopus 로고
    • In VINI veritas: Realistic and controlled network experimentation
    • DOI 10.1145/1151659.1159916
    • Bavier A, Feamster N, Huang M, Peterson L, Rexford J (2006) In vini veritas: realistic and controlled network experimentation. In: SIGCOMM '06: Proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications, pp 3-14. ACM, New York, NY, USA. http://doi.acm.org/10.1145/1159913.1159916 (Pubitemid 44623711)
    • (2006) Computer Communication Review , vol.36 , Issue.4 , pp. 3-14
    • Bavier, A.1    Feamster, N.2    Huang, M.3    Peterson, L.4    Rexford, J.5
  • 62
    • 77954908948 scopus 로고    scopus 로고
    • Cloud security and privacy: An enterprise perspective on risks and compliance
    • Sebastopol, CA, USA
    • Mather T, Kumaraswamy S, Latif S (2009) Cloud security and privacy: an enterprise perspective on risks and compliance. O'Reailly Media, Sebastopol, CA, USA
    • (2009) O'Reailly Media
    • Mather, T.1    Kumaraswamy, S.2    Latif, S.3
  • 63
    • 34548029519 scopus 로고    scopus 로고
    • Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors
    • DOI 10.1145/1272996.1273025, Operating Systems Review - Proceedings of the 2007 EuroSys Conference
    • Soltesz S, Potzl H, Pluczynski M, Bavier A, Peterson L (2007) Copntainer-based operating system virtualization: A scalablem hig-performance alternative to hypervisors. In: Eurosys, pp 275-287 (Pubitemid 47281589)
    • (2007) Operating Systems Review (ACM) , pp. 275-287
    • Soltesz, S.1    Potzl, H.2    Fiuczynski, M.E.3    Bavier, A.4    Peterson, L.5
  • 66
    • 69949091240 scopus 로고    scopus 로고
    • Networking challenges and resultant approaches for large scale cloud construction
    • Bernstein D, Ludvigson E (2009) Networking challenges and resultant approaches for large scale cloud construction.In: Grid and pervasive computing conference, workshops at the 0:136-142. http://doi.ieeecomputersociety.org/10. 1109/GPC.2009.10
    • (2009) Grid and Pervasive Computing Conference, Workshops at the 0 , pp. 136-142
    • Bernstein, D.1    Ludvigson, E.2
  • 70
    • 77950875313 scopus 로고    scopus 로고
    • Quantified security is a weak hypothesis: A critical survey of results and assumptions
    • ACM, New York, NY, USA
    • Verendel V (2009) Quantified security is a weak hypothesis: a critical survey of results and assumptions. In: NSPW '09: Proceedings of the 2009 workshop on new security paradigms workshop, pp 37-50. ACM, New York, NY, USA. http://doi.acm.org/10.1145/1719030.1719036
    • (2009) NSPW '09: Proceedings of the 2009 Workshop on New Security Paradigms Workshop , pp. 37-50
    • Verendel, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.