2016
DOI: 10.7763/ijcte.2016.v8.1048
|View full text |Cite
|
Sign up to set email alerts
|

Virtualization at File System Level: A New Approach to Secure Data in Shared Environment

Abstract: Abstract-The growth of networking services has led to an increase of users using these services. Because of the limitation of network infrastructure, each physical server is typically used for deploying a networking service for a group of users. In this model, data is centrally stored; As a result, ensuring its privacy is a critical requirement. In current systems, an administrator could use access control mechanisms provided by operating systems to prevent illegal access. However, these solutions are difficu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…internet and software (Holt, 2007;Holt and Bossler, 2008). For example, in a shared website hosting environment, if the attacker is able to compromise the targeted website, the other website that also used the same server is also vulnerable to data theft (Tran et al, 2016). It also can be done manually (easy) such as stealing personal information from mailboxes or during a robbery (Allison et al, 2005;Copes and Vieraitis, 2009;Gordon et al, 2007;Morris, 2010).…”
Section: Customer Data Security and Theftmentioning
confidence: 99%
“…internet and software (Holt, 2007;Holt and Bossler, 2008). For example, in a shared website hosting environment, if the attacker is able to compromise the targeted website, the other website that also used the same server is also vulnerable to data theft (Tran et al, 2016). It also can be done manually (easy) such as stealing personal information from mailboxes or during a robbery (Allison et al, 2005;Copes and Vieraitis, 2009;Gordon et al, 2007;Morris, 2010).…”
Section: Customer Data Security and Theftmentioning
confidence: 99%