메뉴 건너뛰기




Volumn , Issue , 2012, Pages 72-79

Enabling secure multitenancy in cloud computing: Challenges and approaches

Author keywords

cloud computing; Multitenancy; resource isolation; security

Indexed keywords

COMPUTING SERVICES; ECONOMIC BENEFITS; ISOLATION TECHNIQUES; IT ASSETS; MANAGEMENT COSTS; MULTI TENANTS; MULTITENANCY; OPERATIONAL SECURITY; RESOURCE ISOLATION; SECURITY; SERVICE PROVIDER; TECHNICAL MATURITY; UTILIZATION RATES;

EID: 84863704395     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/BCFIC.2012.6217983     Document Type: Conference Paper
Times cited : (22)

References (67)
  • 1
    • 84863645697 scopus 로고    scopus 로고
    • Managed Code Rootkits: Hooking into Runtime Environments
    • E. Metula, "Managed Code Rootkits: Hooking into Runtime Environments,"in BlackHat USA, 2009.
    • (2009) BlackHat USA
    • Metula, E.1
  • 2
    • 84863645696 scopus 로고    scopus 로고
    • NET Framework Rootkits: Backdoors Inside Your Framework
    • E. Metula, ".NET Framework Rootkits: Backdoors Inside Your Framework,"in BlackHat Europe, 2009.
    • (2009) BlackHat Europe
    • Metula, E.1
  • 3
    • 84863677711 scopus 로고    scopus 로고
    • JavaSnoop: How to hack anything in Java
    • A. Dabirsiaghi, "JavaSnoop: How to hack anything in Java," in BlackHat Las Vegas, 2010.
    • (2010) BlackHat Las Vegas
    • Dabirsiaghi, A.1
  • 4
    • 84858758065 scopus 로고    scopus 로고
    • Vx32: Lightweight user-level sandboxing on the x86
    • B. Ford and R. Cox, "Vx32: lightweight user-level sandboxing on the x86," in USENIX ATC, 2008.
    • (2008) USENIX ATC
    • Ford, B.1    Cox, R.2
  • 5
    • 33646805500 scopus 로고    scopus 로고
    • Cache missing for fun and profit
    • C. Percival, "Cache missing for fun and profit," in BSDCan, 2005.
    • (2005) BSDCan
    • Percival, C.1
  • 6
    • 85084161596 scopus 로고    scopus 로고
    • Analysis of the intel pentium's ability to support a secure virtual machine monitor
    • J. S. Robin and C. E. Irvine, "Analysis of the intel pentium's ability to support a secure virtual machine monitor," in USENIX Security Symposium, 2000.
    • USENIX Security Symposium, 2000
    • Robin, J.S.1    Irvine, C.E.2
  • 7
    • 70849091604 scopus 로고    scopus 로고
    • An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments
    • T. Ormandy, "An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments," in CanSecWest, 2007.
    • (2007) CanSecWest
    • Ormandy, T.1
  • 11
    • 53349091372 scopus 로고    scopus 로고
    • Compatibility is not transparency: Vmm detection myths and realities
    • T. Garfinkel, et al., "Compatibility is not transparency: Vmm detection myths and realities," in HotOS, 2007.
    • (2007) HotOS
    • Garfinkel, T.1
  • 12
    • 74049116761 scopus 로고    scopus 로고
    • Remote detection of virtual machine monitors with fuzzy benchmarking
    • April
    • J. Franklin, et al., "Remote detection of virtual machine monitors with fuzzy benchmarking," SIGOPS Oper. Syst. Rev., April 2008.
    • (2008) SIGOPS Oper. Syst. Rev.
    • Franklin, J.1
  • 13
    • 4444318660 scopus 로고    scopus 로고
    • Terra: A virtual machine-based platform for trusted computing
    • T. Garfinkel, et al., "Terra: a virtual machine-based platform for trusted computing," in SOSP, 2003.
    • (2003) SOSP
    • Garfinkel, T.1
  • 14
    • 84863687305 scopus 로고    scopus 로고
    • June
    • Trusted Computing Group, http://www.trustedcomputinggroup.org/, June 2011.
    • (2011)
  • 16
    • 77950820630 scopus 로고    scopus 로고
    • Hima: A hypervisor-based integrity measurement agent
    • dec.
    • A. Azab, et al., "Hima: A hypervisor-based integrity measurement agent," in ACSAC, dec. 2009.
    • (2009) ACSAC
    • Azab, A.1
  • 17
    • 84863691168 scopus 로고    scopus 로고
    • Aug.
    • Moonsols, "LiveCloudKd," http://www.moonsols.com/2010/08/12/ livecloudkd/, Aug. 2011.
    • (2011) LiveCloudKd
  • 18
    • 54049127315 scopus 로고    scopus 로고
    • Forensics examination of volatile system data using virtual introspection
    • April
    • B. Hay and K. Nance, "Forensics examination of volatile system data using virtual introspection," SIGOPS Oper. Syst. Rev., April 2008.
    • (2008) SIGOPS Oper. Syst. Rev.
    • Hay, B.1    Nance, K.2
  • 19
    • 33750248123 scopus 로고    scopus 로고
    • Building a mac-based security architecture for the xen open-source hypervisor
    • R. Sailer, et al., "Building a mac-based security architecture for the xen open-source hypervisor," in ACSAC, 2005.
    • (2005) ACSAC
    • Sailer, R.1
  • 20
    • 84863704754 scopus 로고    scopus 로고
    • May
    • National Security Agency, "Security enhanced linux," http://www.nsa.gov/ research/ selinux/, May 2011.
    • (2011) Security Enhanced Linux
  • 22
    • 78650092747 scopus 로고    scopus 로고
    • Analyzing and comparing the protection quality of security enhanced operating systems
    • H. Chen, N. Li, and Z. Mao, "Analyzing and comparing the protection quality of security enhanced operating systems," in NDSS, 2009.
    • (2009) NDSS
    • Chen, H.1    Li, N.2    Mao, Z.3
  • 23
    • 85067179564 scopus 로고    scopus 로고
    • Capsicum: Practical capabilities for unix
    • R. Watson, et al., "Capsicum: practical capabilities for unix," in USENIX Security, 2010.
    • (2010) USENIX Security
    • Watson, R.1
  • 24
    • 77949482509 scopus 로고    scopus 로고
    • Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
    • R. Riley, X. Jiang, and D. Xu, "Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing," in RAID, 2008.
    • (2008) RAID
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 25
    • 79952398762 scopus 로고    scopus 로고
    • Trusted data sharing over untrusted cloud storage providers
    • Nov.
    • G. Zhao, et al., "Trusted data sharing over untrusted cloud storage providers," in CloudCom, Nov. 2010.
    • (2010) CloudCom
    • Zhao, G.1
  • 27
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry, "Fully homomorphic encryption using ideal lattices," in STOC, 2009.
    • (2009) STOC
    • Gentry, C.1
  • 28
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • March
    • C. Gentry, "Computing arbitrary functions of encrypted data," Commun. ACM, March 2010.
    • (2010) Commun. ACM
    • Gentry, C.1
  • 30
    • 48749099314 scopus 로고    scopus 로고
    • A cooperative internet backup scheme
    • M. Lillibridge, et al., "A cooperative internet backup scheme," in USENIX ATC, 2003.
    • (2003) USENIX ATC
    • Lillibridge, M.1
  • 31
    • 74049144464 scopus 로고    scopus 로고
    • Hail: A high-availability and integrity layer for cloud storage
    • K. Bowers, A. Juels, and A. Oprea, "Hail: A high-availability and integrity layer for cloud storage," in CCS, 2009.
    • (2009) CCS
    • Bowers, K.1    Juels, A.2    Oprea, A.3
  • 32
    • 70449569012 scopus 로고    scopus 로고
    • Ensuring data storage security in cloud computing
    • July
    • C. Wang, et al., "Ensuring data storage security in cloud computing,"in IWQoS, July 2009.
    • (2009) IWQoS
    • Wang, C.1
  • 33
  • 35
    • 79956336361 scopus 로고    scopus 로고
    • Enforcing User Privacy in Web Applications using Erlang
    • I. Papagiannis et al., "Enforcing User Privacy in Web Applications using Erlang," in W2SP, 2009.
    • (2009) W2SP
    • Papagiannis, I.1
  • 36
    • 0012970453 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. K. Franklin, "Identity-based encryption from the weil pairing," in CRYPTO, 2001.
    • (2001) CRYPTO
    • Boneh, D.1    Franklin, M.K.2
  • 37
    • 78751480363 scopus 로고    scopus 로고
    • Identity-based authentication in cloud storage sharing
    • Nov.
    • L. Kang and X. Zhang, "Identity-based authentication in cloud storage sharing," in MINES, Nov. 2010.
    • (2010) MINES
    • Kang, L.1    Zhang, X.2
  • 38
    • 78249245445 scopus 로고    scopus 로고
    • Efficient sharing of secure cloud storage services
    • June
    • Q. Liu, G. Wang, and J. Wu, "Efficient sharing of secure cloud storage services," in CIT, June 2010.
    • (2010) CIT
    • Liu, Q.1    Wang, G.2    Wu, J.3
  • 40
    • 79952408990 scopus 로고    scopus 로고
    • Fine-grained Data Access Control Systems with User Accountability in Cloud Computing
    • J. Li et al., "Fine-grained Data Access Control Systems with User Accountability in Cloud Computing," in CloudCom, 2010.
    • (2010) CloudCom
    • Li, J.1
  • 41
    • 33645998872 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • A. Sahai and B. Waters, "Fuzzy identity-based encryption," in EUROCRYPT, 2005.
    • (2005) EUROCRYPT
    • Sahai, A.1    Waters, B.2
  • 42
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, et al., "Attribute-based encryption for fine-grained access control of encrypted data," in CCS, 2006.
    • (2006) CCS
    • Goyal, V.1
  • 44
    • 57949108294 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • M. Chase, "Multi-authority attribute based encryption," Theory of Cryptography, 2007.
    • (2007) Theory of Cryptography
    • Chase, M.1
  • 45
    • 74049163235 scopus 로고    scopus 로고
    • Improving privacy and security in multi-authority attribute-based encryption
    • M. Chase and S. S. Chow, "Improving privacy and security in multi-authority attribute-based encryption," in CCS, 2009.
    • (2009) CCS
    • Chase, M.1    Chow, S.S.2
  • 46
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • Mar.
    • S. Yu, et al., "Achieving secure, scalable, and fine-grained data access control in cloud computing," in IEEE INFOCOM, Mar. 2010.
    • (2010) IEEE INFOCOM
    • Yu, S.1
  • 47
    • 80051911576 scopus 로고    scopus 로고
    • Cryptographic cloud storage
    • S. Kamara and K. Lauter, "Cryptographic cloud storage," in FC, 2010.
    • (2010) FC
    • Kamara, S.1    Lauter, K.2
  • 48
    • 78650059341 scopus 로고    scopus 로고
    • Toward a Multi-Tenancy Authorization System for Cloud Services
    • Nov.
    • J. Calero, et al., "Toward a Multi-Tenancy Authorization System for Cloud Services," Security Privacy, IEEE, Nov. 2010.
    • (2010) Security Privacy, IEEE
    • Calero, J.1
  • 49
    • 79958720688 scopus 로고    scopus 로고
    • Towards a data-centric view of cloud security
    • W. Zhou, et al., "Towards a data-centric view of cloud security," in CloudDB, 2010.
    • (2010) CloudDB
    • Zhou, W.1
  • 50
    • 77955136320 scopus 로고    scopus 로고
    • Preserving Privacy Based on Semantic Policy Tools
    • L. Kagal and J. Pato, "Preserving Privacy Based on Semantic Policy Tools," IEEE Security & Privacy, 2010.
    • (2010) IEEE Security & Privacy
    • Kagal, L.1    Pato, J.2
  • 51
    • 77955917018 scopus 로고    scopus 로고
    • SMash: Secure Component Model for Cross-Domain Mashups on Unmodified Browsers
    • F. De Keukelaere, et al., "SMash: Secure Component Model for Cross-Domain Mashups on Unmodified Browsers," in WWW, 2008.
    • (2008) WWW
    • De Keukelaere, F.1
  • 52
    • 70349300102 scopus 로고    scopus 로고
    • OMash: Enabling Secure Web Mashups via Object Abstractions
    • S. Crites, F. Hsu, and H. Chen, "OMash: Enabling Secure Web Mashups via Object Abstractions," in CCS, 2008.
    • (2008) CCS
    • Crites, S.1    Hsu, F.2    Chen, H.3
  • 53
    • 77954584716 scopus 로고    scopus 로고
    • Reining in the Web with Content Security Policy
    • S. Stamm, B. Sterne, and G. Markham, "Reining in the Web with Content Security Policy," in WWW, 2010.
    • (2010) WWW
    • Stamm, S.1    Sterne, B.2    Markham, G.3
  • 54
    • 70349266257 scopus 로고    scopus 로고
    • Robust Defenses for Cross-Site Request Forgery
    • A. Barth, C. Jackson, and J. C. Mitchell, "Robust Defenses for Cross-Site Request Forgery," in CCS, 2008.
    • (2008) CCS
    • Barth, A.1    Jackson, C.2    Mitchell, J.C.3
  • 55
    • 84894039463 scopus 로고    scopus 로고
    • Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications
    • M. Dalton, C. Kozyrakis, and N. Zeldovich, "Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications,"in USENIX Security Symposium, 2009.
    • USENIX Security Symposium, 2009
    • Dalton, M.1    Kozyrakis, C.2    Zeldovich, N.3
  • 56
    • 80051946867 scopus 로고    scopus 로고
    • FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications
    • P. Saxena, et al., "FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications," in NDSS, 2010.
    • (2010) NDSS
    • Saxena, P.1
  • 58
    • 85030494194 scopus 로고    scopus 로고
    • WebShield: Enabling Various Web Defense Techniques without Client Side Modifications
    • Z. Li et al., "WebShield: Enabling Various Web Defense Techniques without Client Side Modifications," in NDSS, 2011.
    • (2011) NDSS
    • Li, Z.1
  • 59
    • 85076780225 scopus 로고    scopus 로고
    • Browsershield: Vulnerability-driven filtering of dynamic html
    • C. Reis, et al., "Browsershield: vulnerability-driven filtering of dynamic html," in OSDI, 2006.
    • (2006) OSDI
    • Reis, C.1
  • 60
    • 85076893377 scopus 로고    scopus 로고
    • Spyproxy: Execution-based detection of malicious web content
    • A. Moshchuk, et al., "Spyproxy: execution-based detection of malicious web content," in USENIX Security Symposium, 2007.
    • USENIX Security Symposium, 2007
    • Moshchuk, A.1
  • 63
    • 77958047034 scopus 로고    scopus 로고
    • Ontological approach toward cybersecurity in cloud computing
    • T. Takahashi, Y. Kadobayashi, and H. Fujiwara, "Ontological approach toward cybersecurity in cloud computing," in SIN, 2010.
    • (2010) SIN
    • Takahashi, T.1    Kadobayashi, Y.2    Fujiwara, H.3
  • 64
    • 84863691172 scopus 로고    scopus 로고
    • CYBEX - The Cybersecurity Information Exchange Framework (X.1500)
    • Oct.
    • A. Rutkowski, et al., "CYBEX - The Cybersecurity Information Exchange Framework (X.1500)," CCR, Oct. 2010.
    • (2010) CCR
    • Rutkowski, A.1
  • 65
    • 84863687306 scopus 로고    scopus 로고
    • IODEF-extension to support structured cybersecurity information
    • (draft-ietf-mile-sci-03.txt), Feb.
    • T. Takahashi, et al., "IODEF-extension to support structured cybersecurity information," IETF Internet Draft (draft-ietf-mile-sci-03. txt), Feb. 2012.
    • (2012) IETF Internet Draft
    • Takahashi, T.1
  • 67
    • 85011904060 scopus 로고    scopus 로고
    • The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2
    • Sept.
    • D. Waltermire, et al., "The Technical Specification for the Security Content Automation Protocol (SCAP) : SCAP Version 1.2," NIST Special Publication 800-126 Revision 2, Sept. 2011.
    • (2011) NIST Special Publication 800-126 Revision 2
    • Waltermire, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.