In this thesis, we study problems related to security in three different contexts: cloud scheduling, access control, and logic locking to protect digital ICs. The first set of problems relates to security in cloud computing. Prior work suggests that scheduling, with security as a consideration, can be effective in minimizing information leakage, via side-channels, that can exist when virtual machines (VMs) co-reside in clouds. We analyze the overhead that is incurred by such an approach. We first pose and answer a fundamental question: is the problem tractable? We show that the seemingly simpler sub-cases of initial placement and migration across only two equal-capacity servers are both intractable (NP-hard). However, a decision version ...
PhD ThesisThe advantages of always available services, such as remote device backup or data storage,...
A proficient document chain of importance characteristic based encryption plot is proposed in distri...
Cloud-based platforms have become the principle way to store, share, and synchronize files online. F...
This thesis addresses computer security problems in: Access Control, Ethereum Smart Contracts, Cloud...
Security and fault tolerance are the two major areas in cloud computing systems that need careful at...
Organizations increasingly utilize cloud computing architectures to reduce costs and en- ergy consum...
A Cloud Computing Environment (CCE) leverages the advantages offered by virtualisation to enable vir...
The increasing number of reports on data leakage incidents increasingly erodes the already low consu...
Along with the fast growth of networks and mobile devices, cloud computing has become one of the mos...
In the setting of cloud computing a user wishes to delegate its data, as well as computations over t...
Cloud computing systems (CCSs) enable the sharing of physical computing resources through virtualisa...
Individuals support the incredible intensity of cloud computing, however can't completely believe th...
Cloud computing offers cost effective services on-demand which encourage critical infrastructure pro...
Cloud computing is a type of appropriated computing wherein assets and application stages are dissem...
Side-channel attacks (SCAs) is a potential threat in cloud computing environments (CCEs) as it allow...
PhD ThesisThe advantages of always available services, such as remote device backup or data storage,...
A proficient document chain of importance characteristic based encryption plot is proposed in distri...
Cloud-based platforms have become the principle way to store, share, and synchronize files online. F...
This thesis addresses computer security problems in: Access Control, Ethereum Smart Contracts, Cloud...
Security and fault tolerance are the two major areas in cloud computing systems that need careful at...
Organizations increasingly utilize cloud computing architectures to reduce costs and en- ergy consum...
A Cloud Computing Environment (CCE) leverages the advantages offered by virtualisation to enable vir...
The increasing number of reports on data leakage incidents increasingly erodes the already low consu...
Along with the fast growth of networks and mobile devices, cloud computing has become one of the mos...
In the setting of cloud computing a user wishes to delegate its data, as well as computations over t...
Cloud computing systems (CCSs) enable the sharing of physical computing resources through virtualisa...
Individuals support the incredible intensity of cloud computing, however can't completely believe th...
Cloud computing offers cost effective services on-demand which encourage critical infrastructure pro...
Cloud computing is a type of appropriated computing wherein assets and application stages are dissem...
Side-channel attacks (SCAs) is a potential threat in cloud computing environments (CCEs) as it allow...
PhD ThesisThe advantages of always available services, such as remote device backup or data storage,...
A proficient document chain of importance characteristic based encryption plot is proposed in distri...
Cloud-based platforms have become the principle way to store, share, and synchronize files online. F...