We consider the problem of designing multi-tenant public infrastructure clouds resistant to cross-VM attacks without relying on single-tenancy or on assumptions about the un-derlying hypervisors. In a cross-VM attack (which have been demonstrated recently in Amazon EC2) an adversary launches malicious virtual machines (VM) that perform side-channel attacks against co-located VMs in order to recover their contents. We propose a formal model in which to design and analyze secure VM placement algorithms, which are online vector bin packing algorithms that simultaneously satisfy certain optimization constraints and notions of security. We intro-duce and formalize several notions of security, establishing formal connections between them. We also...
With the demand of resources constantly growing, cloud service providers such as Amazon EC2 and Micr...
Side-channel attacks (SCAs) is a potential threat in cloud computing environments (CCEs) as it allow...
Side-channel attacks (SCAs) is a potential threat in cloud computing environments (CCEs) as it allow...
We consider the problem of designing multi-tenant public infrastructure clouds resistant to cross-VM...
Public infrastructure-as-a-service clouds, such as Amazon EC2, Google Compute Engine (GCE) and Micro...
This report proposes a novel virtual machine (VM) placement technique called "Grouped Instance" in r...
Abstract. While cloud computing provides many advantages in accessibility, scalability and cost effi...
While the services-based model of cloud computing makes more and more IT resources available to a wi...
© 2015 Dr. Yi HanWhile cloud computing has obvious advantages over traditional on-premises computing...
While cloud computing provides many advantages in accessibility, scalability and cost efficiency, it...
The rapidly increasing dependency on use of clouds results in Cloud Service Providers (CSPs) having ...
A Cloud Computing Environment (CCE) leverages the advantages offered by virtualisation to enable vir...
For businesses to benefit from the many opportunities of cloud computing, they must first address a ...
Abstract: Cloud computing is becoming more and more popular in computing infrastructure and it also ...
Cloud computing enables users to consume various IT resources in an on-demand manner, and with low m...
With the demand of resources constantly growing, cloud service providers such as Amazon EC2 and Micr...
Side-channel attacks (SCAs) is a potential threat in cloud computing environments (CCEs) as it allow...
Side-channel attacks (SCAs) is a potential threat in cloud computing environments (CCEs) as it allow...
We consider the problem of designing multi-tenant public infrastructure clouds resistant to cross-VM...
Public infrastructure-as-a-service clouds, such as Amazon EC2, Google Compute Engine (GCE) and Micro...
This report proposes a novel virtual machine (VM) placement technique called "Grouped Instance" in r...
Abstract. While cloud computing provides many advantages in accessibility, scalability and cost effi...
While the services-based model of cloud computing makes more and more IT resources available to a wi...
© 2015 Dr. Yi HanWhile cloud computing has obvious advantages over traditional on-premises computing...
While cloud computing provides many advantages in accessibility, scalability and cost efficiency, it...
The rapidly increasing dependency on use of clouds results in Cloud Service Providers (CSPs) having ...
A Cloud Computing Environment (CCE) leverages the advantages offered by virtualisation to enable vir...
For businesses to benefit from the many opportunities of cloud computing, they must first address a ...
Abstract: Cloud computing is becoming more and more popular in computing infrastructure and it also ...
Cloud computing enables users to consume various IT resources in an on-demand manner, and with low m...
With the demand of resources constantly growing, cloud service providers such as Amazon EC2 and Micr...
Side-channel attacks (SCAs) is a potential threat in cloud computing environments (CCEs) as it allow...
Side-channel attacks (SCAs) is a potential threat in cloud computing environments (CCEs) as it allow...