Proceedings of the 27th Annual ACM Symposium on Applied Computing 2012
DOI: 10.1145/2245276.2232073
|View full text |Cite
|
Sign up to set email alerts
|

Hypervisor-based background encryption

Abstract: To prevent data breaches, many organizations deploy full disk encryption to their computers. While OS-based encryption is widely accepted in practical situations, hypervisorbased encryption offers significant advantages such as OS independence and providing more secure environments. Unfortunately, the initial deployment cost of hypervisor-based encryption systems is rarely discussed. In this paper, we present a hypervisor-based encryption scheme that allows instant deployment of full disk encryption into exist… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 16 publications
(16 reference statements)
0
4
0
Order By: Relevance
“…Hypervisor-based Background Encryption [39] This study proposes a hypervisor-based approach that enables instant disk encryption without interfering with user activities.…”
Section: Cloud Shreddermentioning
confidence: 99%
“…Hypervisor-based Background Encryption [39] This study proposes a hypervisor-based approach that enables instant disk encryption without interfering with user activities.…”
Section: Cloud Shreddermentioning
confidence: 99%
“…-We present a set of protocols for transparent full disk encryption performed at the hypervisor level; while hypervisor-based background encryption has been explored earlier [18], our protocol focuses on a different key handling mechanism where the control over the domain master keys protecting the data storage is transferred to an external trusted party. -We extend previously introduced protocols for trusted launch of VM instances in public IaaS environments [14,16] by introducing additional parameters to direct the allocation of storage resources to a certain administrative domain.…”
Section: Contributionmentioning
confidence: 99%
“…Below follow two examples of this approach, which could be used in combination with the protocols described in this paper. BitVisor (introduced in [28] and further in [29]) is a thin hypervisor based on Intel VT-x and AMD-V designed to enforce I/O device security of virtualized guests. The hypervisor uses a parapass-through architecture that allows to forward a subset of the I/O instructions (keyboard and mouse actions) without modification in order to have a minimal impact on the performance of the VM instances.…”
Section: Related Workmentioning
confidence: 99%
“…It provides parapass-through device drivers that intercept I/O requests and responses to insert additional operations such as security enforcement. The BitVisor core and BitVisor extensions provide a wide range of security facilities such as VPN, background storage encryption [20], and malware signature detection [21]. The major advantage of BitVisor is a small TCB (Trusted Computing Base).…”
Section: Introductionmentioning
confidence: 99%