Rethinking Security in the Era of Cloud Computing

被引:23
作者
Aikat, Jay [1 ]
Akella, Aditya [2 ]
Chase, Jeffrey S. [3 ]
Juels, Ari [4 ]
Reiter, Michael K. [5 ]
Ristenpart, Thomas [6 ]
Sekar, Vyas [7 ]
Swift, Michael [2 ]
机构
[1] Univ North Carolina Chapel Hill, Dept Comp Sci, Chapel Hill, NC USA
[2] Univ Wisconsin Madison, Dept Comp Sci, Madison, WI 53706 USA
[3] Duke Univ, Comp Sci, Durham, NC 27706 USA
[4] Cornell Tech, Jacobs Inst, New York, NY USA
[5] Univ North Carolina Chapel Hill, Chapel Hill, NC USA
[6] Cornell Tech, New York, NY USA
[7] Carnegie Mellon Univ, Elect & Comp Engn Dept, Pittsburgh, PA 15213 USA
基金
美国国家科学基金会;
关键词
Authentication - C (programming language) - Cloud security - Data privacy - Trusted computing;
D O I
10.1109/MSP.2017.80
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has emerged as a dominant computing platform for the foreseeable future, disrupting the way we build and deploy software. This disruption offers a rare opportunity to integrate new computer security approaches. © 2017 Institute of Electrical and Electronics Engineers Inc.. All rights reserved.
引用
收藏
页码:60 / 69
页数:10
相关论文
共 20 条
[1]  
[Anonymous], 2013, Proceedings of the 2013 conference on Internet measurement conference
[2]  
[Anonymous], 2012, Cross-VM Side Channels and Their Use to Extract Private Keys, Computer and communications security", p, DOI DOI 10.1145/2382196.2382230
[3]  
Armknecht F., 2015, A guide to fully homomorphic encryption
[4]  
Chi A., 2017, P 14 USENIX S NETW S
[5]  
Everspaugh A, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P547
[6]  
Fayaz SK, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P817
[7]  
Fayazbakhsh S.K., 2014, NSDI
[8]  
Gember-Jacobson Aaron., 2014, Proceedings of the 2014 ACM conference on SIGCOMM, P163, DOI [DOI 10.1145/2619239, 10.1145/2619239]
[9]  
Juels A., 2013, Proceedings of the 2013 ACM SIGSAC conference on Computer communications security, V11, P145, DOI [10.1145/2508859.2516671, DOI 10.1145/2508859.2516671]
[10]   Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration [J].
Moon, Soo-Jin ;
Sekar, Vyas ;
Reiter, Michael K. .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1595-1606