2020
DOI: 10.1109/access.2020.3021415
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Control Method for Tenants’ Sensitive Information Flow Based on Virtual Boundary Recognition

Abstract: In the cloud environment, owing to the large-scale sharing of the upper application instance and the underlying virtual machine resources, the tenants' information flow boundary in the shared virtual machine is fuzzy and difficult to identify. In addition, protection of tenant information flow between processes is inadequate, resulting in the leakage of sensitive information of tenants. Therefore, a dynamic control method for tenants' sensitive information flow based on virtual boundary recognition is proposed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 34 publications
0
4
0
Order By: Relevance
“…News headlines contain a lot of classified information, which can let the public know the basic situation of the event in the briefest prompt and evaluation, and guide the public to further read [7]. It is a high generalization of the content of the web page, and has a high accuracy when used to classify news web pages [8]. Topic is the supporting point of Title Construction, and the title of the core event under the same topic is the same or similar to that of its related follow-up reports.…”
Section: Information Filtering Algorithm Of News Communicationmentioning
confidence: 99%
“…News headlines contain a lot of classified information, which can let the public know the basic situation of the event in the briefest prompt and evaluation, and guide the public to further read [7]. It is a high generalization of the content of the web page, and has a high accuracy when used to classify news web pages [8]. Topic is the supporting point of Title Construction, and the title of the core event under the same topic is the same or similar to that of its related follow-up reports.…”
Section: Information Filtering Algorithm Of News Communicationmentioning
confidence: 99%
“…With the popularity of cloud computing, studies have been conducted [8]- [15] on the combination of information flow control technology and cloud computing environment. In [8], a loadable Linux kernel module FlowK was designed to provide a mechanism to enforce information flow policies at runtime.…”
Section: Related Work a Access Control And Information Flow Controlmentioning
confidence: 99%
“…Due to the sharing of virtual machine resources, it is difficult to identify the information flow boundary of tenant virtual machines. The authors of [15] proposed a dynamic control method for tenant sensitive information flow based on virtual boundary recognition, which combines the concepts of centralized and decentralized information flow control. Thus, a dynamic control method was established for sensitive information flow.…”
Section: Related Work a Access Control And Information Flow Controlmentioning
confidence: 99%
“…The second characteristics of the proposed framework is to track the changing nature of the data as mentioned in the work by N. E. Moussaid et al [13]. The final characteristics must comply with the deployed virtual machinebased applications hosted on the cloud platforms as suggested by X. Lu et al [14]. Thus, this work considers all the recommendations from the parallel research outcomes and further produces the proposed framework for detection and prevention of the attacks on the cloud application, in tern the virtual machine security.…”
Section: Parallel Research Outcomesmentioning
confidence: 99%