2016
DOI: 10.1109/tsc.2015.2392099
|View full text |Cite
|
Sign up to set email alerts
|

A Trusted IaaS Environment with Hardware Security Module

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…This system also provides cloud administrators a control system that helps them track the live virtual machines which are running and track the activities of the live virtual machines also the administrators can add more security policies on the virtual machines which are silent or at rest while no operations are being executed to strengthen the virtual machines capabilities to defend the attacks. Seol et al (2015) presented the use of hardware and software solutions to protect users' confidential data which can be accessed by administrators due to privilege level and domain controls access. The researchers of this paper have designed custom hardware that can intervein access to the virtual machines if they are not accessed by the authentic users of the machine.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This system also provides cloud administrators a control system that helps them track the live virtual machines which are running and track the activities of the live virtual machines also the administrators can add more security policies on the virtual machines which are silent or at rest while no operations are being executed to strengthen the virtual machines capabilities to defend the attacks. Seol et al (2015) presented the use of hardware and software solutions to protect users' confidential data which can be accessed by administrators due to privilege level and domain controls access. The researchers of this paper have designed custom hardware that can intervein access to the virtual machines if they are not accessed by the authentic users of the machine.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Following this approach, the system can identify malicious users and isolate them to minimize harm. In [17], a hardware security module is presented to prevent cloud administrators from tampering with the security of guest virtual machines. The private cloud monitoring system (PCMONS) [14] was developed as a modular monitoring system for private clouds.…”
Section: Related Workmentioning
confidence: 99%
“…Cloud computing not only requires remote application services, but it also needs to ensure the timeliness and stability of users of the cloud platform [9]. In the cloud computing mode, all business processing will run on the server side.…”
Section: Cloud Computing Reliabilitymentioning
confidence: 99%