메뉴 건너뛰기




Volumn 14, Issue 1, 2017, Pages 95-108

Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing

Author keywords

Cloud computing security; co resident attack; security metrics modelling; virtual machine allocation policy

Indexed keywords

CLOUD COMPUTING; NETWORK SECURITY; VIRTUAL MACHINE;

EID: 85020270849     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2015.2429132     Document Type: Article
Times cited : (162)

References (48)
  • 7
    • 84907000617 scopus 로고    scopus 로고
    • Virtual machine allocation policies against co-resident attacks in cloud computing
    • Y. Han, J. Chan, T. Alpcan, and C. Leckie, "Virtual machine allocation policies against co-resident attacks in cloud computing," in Proc. IEEE Int. Conf. Commun., 2014, pp. 786-792.
    • (2014) Proc. IEEE Int. Conf. Commun. , pp. 786-792
    • Han, Y.1    Chan, J.2    Alpcan, T.3    Leckie, C.4
  • 10
    • 80053167650 scopus 로고    scopus 로고
    • Energy-efficient management of virtual machines in eucalyptus
    • P. Graubner, "Energy-efficient management of virtual machines in eucalyptus," in Proc. 4th IEEE Int. Conf. Cloud Comput., 2011, pp. 243-250.
    • (2011) Proc. 4th IEEE Int. Conf. Cloud Comput. , pp. 243-250
    • Graubner, P.1
  • 11
    • 80053206280 scopus 로고    scopus 로고
    • Energy efficient virtual machine allocation in the coud: An analysis of cloud allocation policies
    • R. Jansen and P. R. Brenner, "Energy efficient virtual machine allocation in the coud: An analysis of cloud allocation policies," in Proc. Int. Green Comput. Conf. Workshops, 2011, pp. 1-8.
    • (2011) Proc. Int. Green Comput. Conf. Workshops , pp. 1-8
    • Jansen, R.1    Brenner, P.R.2
  • 14
    • 84857370722 scopus 로고    scopus 로고
    • Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing
    • A. Beloglazov, J. Abawajy, and R. Buyya, "Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing," Future Gener. Comput. Syst., vol. 28, no. 5, pp. 755-768, 2012.
    • (2012) Future Gener. Comput. Syst. , vol.28 , Issue.5 , pp. 755-768
    • Beloglazov, A.1    Abawajy, J.2    Buyya, R.3
  • 15
    • 85027552037 scopus 로고    scopus 로고
    • CloudSim [Online] Available
    • CloudSim [Online]. Available: Http://www.cloudbus.org/cloudsim/, 2009.
    • (2009)
  • 16
    • 78650777991 scopus 로고    scopus 로고
    • CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms
    • R. Calheiros, R. Ranjan, A. Beloglazov, C. A. F. De Rose, and R. Buyya, "CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms," Softw., Practice Experience, vol. 41, no. 1, pp. 23-50, 2011.
    • (2011) Softw., Practice Experience , vol.41 , Issue.1 , pp. 23-50
    • Calheiros, R.1    Ranjan, R.2    Beloglazov, A.3    De Rose, C.A.F.4    Buyya, R.5
  • 17
    • 85027571608 scopus 로고    scopus 로고
    • OpenStack [Online]. Available
    • OpenStack [Online]. Available: Http://www.openstack.org/, 2010.
    • (2010)
  • 21
    • 85027551348 scopus 로고    scopus 로고
    • Amazon Elastic Compute Cloud (EC2) [Online] Available
    • Amazon Elastic Compute Cloud (EC2) [Online]. Available: Http://aws.amazon.com/ec2/, 2006.
    • (2006)
  • 23
    • 74349098073 scopus 로고    scopus 로고
    • Efficient cache attacks on AES, and countermeasures
    • E. Tromer, D. A. Osvik, and A. Shamir, "Efficient cache attacks on AES, and countermeasures," J. Cryptol., vol. 23, no. 1, pp. 37-71, 2010.
    • (2010) J. Cryptol. , vol.23 , Issue.1 , pp. 37-71
    • Tromer, E.1    Osvik, D.A.2    Shamir, A.3
  • 24
  • 26
    • 80052666134 scopus 로고    scopus 로고
    • Identification and evaluation of sharing memory covert timing channel in xen virtual machines
    • J. Wu, L. Ding, Y. Wang, and W. Han, "Identification and evaluation of sharing memory covert timing channel in xen virtual machines," in Proc. 4th IEEE Int. Conf. Cloud Comput., 2011, pp. 283-291.
    • (2011) Proc. 4th IEEE Int. Conf. Cloud Comput. , pp. 283-291
    • Wu, J.1    Ding, L.2    Wang, Y.3    Han, W.4
  • 28
    • 80052008862 scopus 로고    scopus 로고
    • HomeAlone: Co-residency detection in the cloud via side-channel analysis
    • Y. Zhang, A. Juels, A. Oprea, and M. K. Reiter, "HomeAlone: Co-residency detection in the cloud via side-channel analysis," in Proc. IEEE Symp. Security Privacy, 2011, pp. 313-328.
    • (2011) Proc. IEEE Symp. Security Privacy , pp. 313-328
    • Zhang, Y.1    Juels, A.2    Oprea, A.3    Reiter, M.K.4
  • 30
    • 35348816106 scopus 로고    scopus 로고
    • New cache designs for thwarting software cache-based side channel attacks
    • Z. Wang and R. B. Lee, "New cache designs for thwarting software cache-based side channel attacks," in Proc. 34th Annu. Int. Symp. Comput. Archit., 2007, pp. 494-505.
    • (2007) Proc. 34th Annu. Int. Symp. Comput. Archit. , pp. 494-505
    • Wang, Z.1    Lee, R.B.2
  • 32
    • 84889019424 scopus 로고    scopus 로고
    • Duppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud
    • Y. Zhang and M. K. Reiter, "Duppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud," in Proc. ACMSIGSAC Conf. Comput. Commun. Security, 2013, pp. 827-838.
    • (2013) Proc. ACMSIGSAC Conf. Comput. Commun. Security , pp. 827-838
    • Zhang, Y.1    Reiter, M.K.2
  • 35
    • 84877939689 scopus 로고    scopus 로고
    • Detecting VMs coresidency in cloud: Using cache-based side channel attacks
    • S. Yu, X. Gui, J. Lin, X. Zhang, and J. Wang, "Detecting VMs coresidency in cloud: Using cache-based side channel attacks," Elektronika ir Elektrotechnika, vol. 19, no. 5, pp. 73-78, 2013.
    • (2013) Elektronika Ir Elektrotechnika , vol.19 , Issue.5 , pp. 73-78
    • Yu, S.1    Gui, X.2    Lin, J.3    Zhang, X.4    Wang, J.5
  • 36
    • 84897039338 scopus 로고    scopus 로고
    • On detecting co-resident cloud instances using network flow watermarking techniques
    • A. Bates, B. Mood, J. Pletcher, H. Pruse, M. Valafar, and K. Butler, "On detecting co-resident cloud instances using network flow watermarking techniques," Int. J. Inf. Security, vol. 13, no. 2, pp. 171-189, 2014.
    • (2014) Int. J. Inf. Security , vol.13 , Issue.2 , pp. 171-189
    • Bates, A.1    Mood, B.2    Pletcher, J.3    Pruse, H.4    Valafar, M.5    Butler, K.6
  • 37
  • 38
    • 84876748582 scopus 로고    scopus 로고
    • An approach with two-stage mode to detect cache-based side channel attacks
    • S. Yu, X. Gui, and J. Lin, "An approach with two-stage mode to detect cache-based side channel attacks," in Proc. Int. Conf. Inf. Netw., 2013, pp. 186-191.
    • (2013) Proc. Int. Conf. Inf. Netw. , pp. 186-191
    • Yu, S.1    Gui, X.2    Lin, J.3
  • 44
    • 2442535151 scopus 로고    scopus 로고
    • Survey of multi-objective optimization methods for engineering
    • R. T. Marler and J. S. Arora, "Survey of multi-objective optimization methods for engineering," Struct. Multidisciplinary Optimization, vol. 26, no. 6, pp. 369-395, 2004.
    • (2004) Struct. Multidisciplinary Optimization , vol.26 , Issue.6 , pp. 369-395
    • Marler, R.T.1    Arora, J.S.2
  • 48
    • 85027588190 scopus 로고    scopus 로고
    • Research cloud NeCTAR[Online]. Available
    • Research cloud NeCTAR[Online]. Available: Http://www.nectar. org.au/, 2011.
    • (2011)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.