2017
DOI: 10.1109/tcc.2015.2469657
|View full text |Cite
|
Sign up to set email alerts
|

Secure Outsourcing of Virtual Appliance

Abstract: Computation outsourcing using virtual appliance is getting prevalent in cloud computing. However, with both hardware and software being controlled by potentially curious or even malicious cloud operators, it is no surprise to see frequent reports of security accidents, like data leakages or abuses. This paper proposes Kite, a hardware-software framework that guards the security of tenant's virtual machine (VM), in which the outsourced computation is encapsulated. Kite only trusts the processor and makes no sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 50 publications
0
4
0
Order By: Relevance
“…The analysis and result show that the performance overhead is small [33]. malicious insiders in a computing environment [33].…”
Section: Sukhpal Et Al[28] 2017mentioning
confidence: 98%
See 1 more Smart Citation
“…The analysis and result show that the performance overhead is small [33]. malicious insiders in a computing environment [33].…”
Section: Sukhpal Et Al[28] 2017mentioning
confidence: 98%
“…The Proposed method addressed the data protection in public clouds,the work can be extended with other deployment models [31]. The analysis and result show that the performance overhead is small [33]. malicious insiders in a computing environment [33].…”
Section: Sukhpal Et Al[28] 2017mentioning
confidence: 99%
“…Data encryption is the main solution to guarantee the privacy of data against malicious attacks in the databases. Therefore, encryption methods have momentous routine inferences in cloud [2].…”
Section: Reliability Security and Privacy Issues In Virtualizationmentioning
confidence: 99%
“…They then demonstrate how the architecture can be used to secure the life cycle of virtual machines and migration of virtual machines across different physical servers. Similarly, Xia et al (2016) present an integrated hardware and software approach to ensure the security of a cloud user's virtual machine when the computations are outsourced to the cloud. Paladi, Gehrmann, and Michalas (2016) describe a framework for data and operation security in the Infrastructure as a Service (IaaS) model.…”
Section: Securitymentioning
confidence: 99%