期刊文献+

基于体系结构扩展的云计算安全增强研究 被引量:2

Researches on Architecture Extensions for Cloud Security
在线阅读 下载PDF
导出
摘要 近年来,云计算的安全问题得到了广泛的关注。由于云计算模式的共享、外包和开发的特性,用户并不拥有对计算和数据的完全控制;相反,云平台内部的恶意系统管理员可在用户不知情的情况下窃取或篡改用户的关键数据。研究者们为保护云计算数据的隐私性与完整性,对体系结构进行了扩展,尝试缩小云安全所依赖的软硬件栈。本文阐述了这些研究中采用的主要技术类型,包括内存隔离增强、安全处理器加密等。 The security issue of cloud computing has received widely attention in recent years. Due to the sharing, out-sourcing and openness features of cloud computing mode, the end-users don’t gain the complete control over their computing and data. Instead, a malicious system operator can tamper with or steal user’s critical data without user’s awareness. Some researchers tried to protect the privacy and integrity of data in the cloud by extending architecture and reduce the hardware/software stack that cloud security relies on. This paper presents technologies in these researches, including enforcing memory isolation, encryption by secure processor, et al.
出处 《集成技术》 2012年第4期30-33,共4页 Journal of Integration Technology
关键词 云计算安全 虚拟化安全 体系结构扩展 cloud security virtualization security architecture extension
  • 相关文献

参考文献12

  • 1Zhang Fengzhe,Chen Jin,Chen Haibo,et al.CloudVisor:Retrofitting protection of virtual machines in multi-tenant cloudwith nested virtualization. Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles . 2011
  • 2LIE D,THEKKATHC,MITCHELL M,et al.Architectural supportfor copy and tamper resistant software. Proc of the 9th Interna-tional Conference on Architectural Support for Programming Languageand Operating Systems . 2000
  • 3David Lie,,Chandramohan A Thekkath,Mark Horowitz.Implementing an untrusted operating system on trusted hardware. Proceedings of the nineteenth ACM symposium on Operating systems principles . 2003
  • 4G.Edward,D.Clarke,B Gassend et al.AEGIS:architecture fortamper-evident and tamper-resistant processing. Proceedings of the17thannual international conference on Supercomputing . 2003
  • 5W. shi,H. H. S. Lee.Authentication Control Point and Its Implications For Secure Processor Design. Proceeding of the 39th Annual IEEE/ACM International Symposium on Microarchitecture . 2006
  • 6Common vulnerabilities and exposures. http://cve.mitre.org/ . 2012
  • 7Jin S,Ahn J,Cha S,et al.Architectural support for secure virtualization under a vulnerable VMM. Proceedings in the 44th Annual IEEE/ACM International Symposium on Microarchitecture . 2011
  • 8Szefer J,Lee R.Architectural support for VMM-secure virtualization. Proceedings in the Conference of Architectural Support for Programming Languages and Operating Systems . 2012
  • 9Chhabra S,Rogers B,Solihin Y,et al.SecureME:a hardware-software approach to full system security. Proceedings of the international conference on Supercomputing . 2011
  • 10Champagne D,Lee R.Scalable architectural support for trusted software. Proceedings of the IEEE International Symposium on High Performance Computer Architecture . 2010

同被引文献10

引证文献2

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部