The Final Frontier: Confidentiality and Privacy in the Cloud

被引:23
作者
Rocha, Francisco [1 ]
Abreu, Salvador [2 ]
Correia, Miguel [3 ]
机构
[1] Carnegie Mellon Univ, Univ Lisbon, Pittsburgh, PA 15213 USA
[2] Univ Evora, Dept Comp Sci, Evora, Portugal
[3] Univ Tecn Lisboa, Inst Super Tecn, Lisbon, Portugal
关键词
Cryptography; Computer security; Virtual machine monitors; Monitoring; Cloud computing; Privacy; TrustVisor; Trusted computing;
D O I
10.1109/MC.2011.223
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The boundary between the trusted inside and the untrusted outside blurs when a company adopts cloud computing. The organization's applications and data are no longer onsite, fundamentally changing the definition of a malicious insider. © 2006 IEEE.
引用
收藏
页码:44 / 50
页数:7
相关论文
共 12 条
  • [1] [Anonymous], CMUSEI2011TN006
  • [2] [Anonymous], 2009, NIST DEFINITION CLOU
  • [3] [Anonymous], P 4 ACM SIGPLAN SIGO
  • [4] [Anonymous], P 6 C SALZB AUSTR AP
  • [5] *CLOUD SEC ALL, 2010, TOP THREATS CLOUD CO, V1
  • [6] Cloud Computing Roundtable
    Grosse, Eric
    Howie, John
    Ransome, James
    Reavis, Jim
    Schmidt, Steve
    [J]. IEEE SECURITY & PRIVACY, 2010, 8 (06) : 17 - 23
  • [7] TrustVisor: Efficient TCB Reduction and Attestation
    McCune, Jonathan M.
    Li, Yanlin
    Qu, Ning
    Zhou, Zongwei
    Datta, Anupam
    Gligor, Virgil
    Perrig, Adrian
    [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 143 - 158
  • [8] Ristenpart Thomas., 2009, P 16 ACM C COMPUTER, V199-212, DOI DOI 10.1145/1653662.1653687
  • [9] Rocha F., 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), P129, DOI 10.1109/DSNW.2011.5958798
  • [10] Virtual machine monitors: Current technology and future trends
    Rosenblum, M
    Garfinkel, T
    [J]. COMPUTER, 2005, 38 (05) : 39 - +