메뉴 건너뛰기




Volumn 48, Issue 7, 2011, Pages 1155-1167

Lifetime privacy and self-destruction of data in the cloud

Author keywords

Cloud computing; Data self destruction; Privacy protection; User data; Virtualization

Indexed keywords

DATA CENTERS; DATA SELF-DESTRUCTION; END USERS; HYPERVISOR; LIFE-TIMES; ON-LINE SERVICE; PERFORMANCE EVALUATION; PRIVACY PROTECTION; PROTOTYPE SYSTEM; RUNTIME OVERHEADS; TRUSTED AGENTS; TRUSTED COMPUTING; TRUSTED ROOT; USER DATA; VIRTUALIZATIONS;

EID: 80051563957     PISSN: 10001239     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (25)

References (25)
  • 1
    • 68249129760 scopus 로고    scopus 로고
    • Above the clouds: A berkeley view of cloud computing
    • UCB/EECS-2009-28. Berkeley: University of California, EECS Department
    • Armbrust M, Fox A, Griffith R, et al. Above the clouds: A berkeley view of cloud computing, UCB/EECS-2009-28[R]. Berkeley: University of California, EECS Department, 2009
    • (2009)
    • Armbrust, M.1    Fox, A.2    Griffith, R.3
  • 4
    • 80051576193 scopus 로고    scopus 로고
    • Amazon Web services customer agreement
    • 2009-10-01
    • Amazon Inc. Amazon Web services customer agreement[EB/OL]. [2009-10-01]. http://aws.amazon.com/agreement/#7
  • 5
    • 35348963573 scopus 로고    scopus 로고
    • Daonity-grid security from two levels of virtualization
    • Chen Haibo, Chen Jieyun, Mao Wenbo, et al. Daonity-grid security from two levels of virtualization[J]. Information Security Technical Report, 2007, 12(3): 123-138
    • (2007) Information Security Technical Report , vol.12 , Issue.3 , pp. 123-138
    • Chen, H.1    Chen, J.2    Mao, W.3
  • 8
    • 58049139900 scopus 로고    scopus 로고
    • Tamper-resistant execution in an untrusted operating system using a virtual machine monitor, 2007-08001
    • Shanghai: Fudan University, Parallel Processing Institute
    • Chen Haibo, Zhang Fengzhe, Chen Cheng, et al. Tamper-resistant execution in an untrusted operating system using a virtual machine monitor, 2007-08001[R]. Shanghai: Fudan University, Parallel Processing Institute, 2007
    • (2007)
    • Chen, H.1    Zhang, F.2    Chen, C.3
  • 9
    • 70249085218 scopus 로고    scopus 로고
    • A hypervisor based system for protecting software runtime memory and persistent storage
    • New York: ACM
    • Dewan P, Durham D, Khosravi H, et al. A hypervisor based system for protecting software runtime memory and persistent storage[C]//Proc of the 2008 Spring Simulation Multiconference. New York: ACM, 2008: 828-835
    • (2008) Proc of the 2008 Spring Simulation Multiconference , pp. 828-835
    • Dewan, P.1    Durham, D.2    Khosravi, H.3
  • 10
    • 77955817084 scopus 로고    scopus 로고
    • Improving the dependability of cloud computing systems
    • Chinese source. Shanghai: Parallel Processing Institute, Fudan University
    • Chen Haibo. Improving the Dependability of Cloud Computing Systems[D]. Shanghai: Parallel Processing Institute, Fudan University, 2008 (in Chinese)
    • (2008)
    • Chen, H.1
  • 11
    • 85018107502 scopus 로고    scopus 로고
    • Vanish: Increasing data privacy with self-destructing data
    • Berkeley, CA: USENIX
    • Geambasu R, Kohno T, Levy A, et al. Vanish: Increasing data privacy with self-destructing data[C]//Proc of the 18th USENIX Security Symp. Berkeley, CA: USENIX, 2009: 299-316
    • (2009) Proc of the 18th USENIX Security Symp , pp. 299-316
    • Geambasu, R.1    Kohno, T.2    Levy, A.3
  • 13
    • 78149314301 scopus 로고    scopus 로고
    • Tpm specification version 1.2, revision 103
    • 2007-07-09
    • Trusted Computing Group. Tpm specification version 1.2, revision 103[EB/OL]. [2007-07-09]. http://www.trustedcomputinggroup.org
  • 14
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • Berkeley, CA: USENIX
    • Sailer R, Zhang X, Jaeger T, et al. Design and implementation of a TCG-based integrity measurement architecture[C]//Proc of the 13th USENIX Security Symp. Berkeley, CA: USENIX, 2004: 223-238
    • (2004) Proc of the 13th USENIX Security Symp , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3
  • 15
    • 34047117968 scopus 로고    scopus 로고
    • Cache missing for fun and profit
    • 2005-05-13
    • Percival C. Cache missing for fun and profit[EB/OL]. [2005-05-13]. http://www.daemonology.net/hyperthreading-considered-harmful
    • Percival, C.1
  • 19
    • 33744529805 scopus 로고    scopus 로고
    • Cache-timing attacks on AES
    • 2004-11-11
    • Bernstein D. Cache-timing attacks on AES[EB/OL]. [2004-11-11]. http://cr.yp.to/papers.html#cachetiming
    • Bernstein, D.1
  • 25
    • 35348816106 scopus 로고    scopus 로고
    • New cache designs for thwarting software cache-based side channel attacks
    • New York: ACM
    • Wang Z, Lee R. New cache designs for thwarting software cache-based side channel attacks[C]//Proc of the 34th Annual Int Symp on Computer Architecture. New York: ACM, 2007: 494-505
    • (2007) Proc of the 34th Annual Int Symp on Computer Architecture , pp. 494-505
    • Wang, Z.1    Lee, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.